Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-14634 (GCVE-0-2018-14634)
Vulnerability from cvelistv5
Published
2018-09-25 21:00
Modified
2024-08-05 09:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
The Linux Foundation | kernel |
Version: 2.6.x, 3.10.x, 4.14.x |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:38:13.057Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2018:3540", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3540" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190204-0002/" }, { "name": "RHSA-2018:2925", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2925" }, { "name": "RHSA-2018:3591", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3591" }, { "name": "45516", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/45516/" }, { "name": "USN-3775-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3775-1/" }, { "name": "RHSA-2018:2933", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2933" }, { "name": "USN-3779-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3779-1/" }, { "name": "RHSA-2018:2748", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2748" }, { "name": "RHSA-2018:3590", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3590" }, { "name": "USN-3775-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3775-2/" }, { "name": "RHSA-2018:2763", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2763" }, { "name": "105407", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105407" }, { "name": "RHSA-2018:2924", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2924" }, { "name": "RHSA-2018:3586", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3586" }, { "name": "RHSA-2018:3643", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3643" }, { "name": "RHSA-2018:2846", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2846" }, { "name": "[oss-security] 20180925 Integer overflow in Linux\u0027s create_elf_tables() (CVE-2018-14634)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://www.openwall.com/lists/oss-security/2018/09/25/4" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14634" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K20934447?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2018-14634" }, { "name": "[oss-security] 20210720 CVE-2021-33910: Denial of service (stack exhaustion) in systemd (PID 1)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/07/20/2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "kernel", "vendor": "The Linux Foundation", "versions": [ { "status": "affected", "version": "2.6.x, 3.10.x, 4.14.x" } ] } ], "datePublic": "2018-09-25T00:00:00", "descriptions": [ { "lang": "en", "value": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-20T14:06:15", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2018:3540", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3540" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190204-0002/" }, { "name": "RHSA-2018:2925", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2925" }, { "name": "RHSA-2018:3591", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3591" }, { "name": "45516", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/45516/" }, { "name": "USN-3775-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3775-1/" }, { "name": "RHSA-2018:2933", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2933" }, { "name": "USN-3779-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3779-1/" }, { "name": "RHSA-2018:2748", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2748" }, { "name": "RHSA-2018:3590", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3590" }, { "name": "USN-3775-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3775-2/" }, { "name": "RHSA-2018:2763", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2763" }, { "name": "105407", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105407" }, { "name": "RHSA-2018:2924", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2924" }, { "name": "RHSA-2018:3586", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3586" }, { "name": "RHSA-2018:3643", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3643" }, { "name": "RHSA-2018:2846", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2846" }, { "name": "[oss-security] 20180925 Integer overflow in Linux\u0027s create_elf_tables() (CVE-2018-14634)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://www.openwall.com/lists/oss-security/2018/09/25/4" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14634" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K20934447?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.paloaltonetworks.com/CVE-2018-14634" }, { "name": "[oss-security] 20210720 CVE-2021-33910: Denial of service (stack exhaustion) in systemd (PID 1)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/07/20/2" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-14634", "datePublished": "2018-09-25T21:00:00", "dateReserved": "2018-07-27T00:00:00", "dateUpdated": "2024-08-05T09:38:13.057Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-14634\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2018-09-25T21:29:00.390\",\"lastModified\":\"2024-11-21T03:49:28.560\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.\"},{\"lang\":\"es\",\"value\":\"Se ha encontrado un error de desbordamiento de enteros en la funci\u00f3n create_elf_tables() del kernel de Linux. Un usuario local sin privilegios con acceso al binario SUID (o a otro privilegiado) podr\u00eda emplear este error para escalar sus privilegios en el sistema. Se cree que las versiones 2.6.x, 3.10.x y 4.14.x del kernel se han visto afectadas.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.0\",\"versionEndIncluding\":\"2.6.39.4\",\"matchCriteriaId\":\"C737E90F-5DD9-493E-9318-6A97012B6103\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.10.0\",\"versionEndIncluding\":\"3.10.102\",\"matchCriteriaId\":\"2452BC55-3EAF-4F7B-B55B-563E94E2333E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.14.0\",\"versionEndIncluding\":\"4.14.54\",\"matchCriteriaId\":\"4AE02892-57B2-4595-A57F-2C8B4C6F3D0C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16E6D998-B41D-4B49-9E00-8336D2E40A4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B353CE99-D57C-465B-AAB0-73EF581127D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C81647C-9A53-481D-A54C-36770A093F90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF77CDCF-B9C9-427D-B2BF-36650FB2148C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13E02156-E748-4820-B76F-7074793837E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"8D305F7A-D159-4716-AB26-5E38BB5CD991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83077160-BB98-408B-81F0-8EF9E566BF28\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2021/07/20/2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/105407\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2748\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2763\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2846\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2924\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2925\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2933\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3540\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3586\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3590\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3591\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3643\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14634\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190204-0002/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security.paloaltonetworks.com/CVE-2018-14634\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://support.f5.com/csp/article/K20934447?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://usn.ubuntu.com/3775-1/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3775-2/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3779-1/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/45516/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.openwall.com/lists/oss-security/2018/09/25/4\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/07/20/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/105407\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2748\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2763\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2846\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2924\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2925\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2933\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3540\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3586\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3590\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3591\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3643\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14634\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190204-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security.paloaltonetworks.com/CVE-2018-14634\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.f5.com/csp/article/K20934447?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/3775-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3775-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3779-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/45516/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.openwall.com/lists/oss-security/2018/09/25/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]}]}}" } }
suse-su-2018:3238-1
Vulnerability from csaf_suse
Published
2018-10-18 19:02
Modified
2018-10-18 19:02
Summary
Security update for the Linux Kernel (Live Patch 29 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 29 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_106 fixes several issues.
The following security issues were fixed:
- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14634: An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable (bsc#1108963).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
Patchnames
SUSE-SLE-SERVER-12-2018-2308,SUSE-SLE-SERVER-12-2018-2309,SUSE-SLE-SERVER-12-2018-2310,SUSE-SLE-SERVER-12-2018-2311,SUSE-SLE-SERVER-12-2018-2312,SUSE-SLE-SERVER-12-2018-2313,SUSE-SLE-SERVER-12-2018-2314,SUSE-SLE-SERVER-12-2018-2315,SUSE-SLE-SERVER-12-2018-2316,SUSE-SLE-SERVER-12-2018-2317
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 29 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_106 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).\n- CVE-2018-14634: An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable (bsc#1108963).\n- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target\u0027s code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-2308,SUSE-SLE-SERVER-12-2018-2309,SUSE-SLE-SERVER-12-2018-2310,SUSE-SLE-SERVER-12-2018-2311,SUSE-SLE-SERVER-12-2018-2312,SUSE-SLE-SERVER-12-2018-2313,SUSE-SLE-SERVER-12-2018-2314,SUSE-SLE-SERVER-12-2018-2315,SUSE-SLE-SERVER-12-2018-2316,SUSE-SLE-SERVER-12-2018-2317", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3238-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:3238-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183238-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:3238-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004742.html" }, { "category": "self", "summary": "SUSE Bug 1107832", "url": "https://bugzilla.suse.com/1107832" }, { "category": "self", "summary": "SUSE Bug 1108963", "url": "https://bugzilla.suse.com/1108963" }, { "category": "self", "summary": "SUSE Bug 1110233", "url": "https://bugzilla.suse.com/1110233" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14633 page", "url": "https://www.suse.com/security/cve/CVE-2018-14633/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14634 page", "url": "https://www.suse.com/security/cve/CVE-2018-14634/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17182 page", "url": "https://www.suse.com/security/cve/CVE-2018-17182/" } ], "title": "Security update for the Linux Kernel (Live Patch 29 for SLE 12)", "tracking": { "current_release_date": "2018-10-18T19:02:45Z", "generator": { "date": "2018-10-18T19:02:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:3238-1", "initial_release_date": "2018-10-18T19:02:45Z", "revision_history": [ { "date": "2018-10-18T19:02:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-14633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14633" } ], "notes": [ { "category": "general", "text": "A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target\u0027s code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14633", "url": "https://www.suse.com/security/cve/CVE-2018-14633" }, { "category": "external", "summary": "SUSE Bug 1107829 for CVE-2018-14633", "url": "https://bugzilla.suse.com/1107829" }, { "category": "external", "summary": "SUSE Bug 1107832 for CVE-2018-14633", "url": "https://bugzilla.suse.com/1107832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T19:02:45Z", "details": "moderate" } ], "title": "CVE-2018-14633" }, { "cve": "CVE-2018-14634", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14634" } ], "notes": [ { "category": "general", "text": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14634", "url": "https://www.suse.com/security/cve/CVE-2018-14634" }, { "category": "external", "summary": "SUSE Bug 1108912 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1108912" }, { "category": "external", "summary": "SUSE Bug 1108963 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1108963" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1120323 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1120323" }, { "category": "external", "summary": "SUSE Bug 1122265 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1122265" }, { "category": "external", "summary": "SUSE Bug 1188063 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1188063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T19:02:45Z", "details": "important" } ], "title": "CVE-2018-14634" }, { "cve": "CVE-2018-17182", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-17182" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-17182", "url": "https://www.suse.com/security/cve/CVE-2018-17182" }, { "category": "external", "summary": "SUSE Bug 1108399 for CVE-2018-17182", "url": "https://bugzilla.suse.com/1108399" }, { "category": "external", "summary": "SUSE Bug 1110233 for CVE-2018-17182", "url": "https://bugzilla.suse.com/1110233" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T19:02:45Z", "details": "moderate" } ], "title": "CVE-2018-17182" } ] }
suse-su-2018:2907-1
Vulnerability from csaf_suse
Published
2018-09-27 14:02
Modified
2018-09-27 14:02
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a
local attacker to exploit this vulnerability via a SUID-root binary and obtain
full root privileges (bsc#1108912).
- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local
attackers to use a incorrect bounds check in the CDROM driver
CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that
could have been used by local attackers to read kernel memory (bnc#1107689)
- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a
denial of service (ias_object use-after-free and system crash) or possibly have
unspecified other impact via an AF_IRDA socket (bnc#1106511)
- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed
local users to cause a denial of service (memory consumption) by repeatedly
binding an AF_IRDA socket (bnc#1106509)
- CVE-2018-15572: The spectre_v2_select_mitigation function did not always fill
RSB upon a context switch, which made it easier for attackers to conduct
userspace-userspace spectreRSB attacks (bnc#1102517)
- CVE-2018-10902: Protect against concurrent access to prevent double realloc
(double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A
malicious local attacker could have used this for privilege escalation
(bnc#1105322).
- CVE-2018-14734: ucma_leave_multicast accessed a certain data structure after
a cleanup step in ucma_process_join, which allowed attackers to cause a denial
of service (use-after-free) (bsc#1103119).
The following non-security bugs were fixed:
- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- KVM: x86: Free vmx_msr_bitmap_longmode while kvm_init failed (bsc#1104367).
- Refresh patches.xen/xen3-x86-l1tf-04-protect-PROT_NONE-ptes.patch (bsc#1105100).
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- ptrace: fix PTRACE_LISTEN race corrupting task->state (bnc#1107001).
- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources (bsc#1057199)
- x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).
- xen x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- xen x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- xen, x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- xen: x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
Patchnames
sleposp3-kernel-13799,slessp3-kernel-13799,slexsp3-kernel-13799
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a\n local attacker to exploit this vulnerability via a SUID-root binary and obtain\n full root privileges (bsc#1108912).\n- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local\n attackers to use a incorrect bounds check in the CDROM driver\n CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)\n- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that\n could have been used by local attackers to read kernel memory (bnc#1107689)\n- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a\n denial of service (ias_object use-after-free and system crash) or possibly have\n unspecified other impact via an AF_IRDA socket (bnc#1106511)\n- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed\n local users to cause a denial of service (memory consumption) by repeatedly\n binding an AF_IRDA socket (bnc#1106509)\n- CVE-2018-15572: The spectre_v2_select_mitigation function did not always fill\n RSB upon a context switch, which made it easier for attackers to conduct\n userspace-userspace spectreRSB attacks (bnc#1102517)\n- CVE-2018-10902: Protect against concurrent access to prevent double realloc\n (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A\n malicious local attacker could have used this for privilege escalation\n (bnc#1105322).\n- CVE-2018-14734: ucma_leave_multicast accessed a certain data structure after\n a cleanup step in ucma_process_join, which allowed attackers to cause a denial\n of service (use-after-free) (bsc#1103119).\n\nThe following non-security bugs were fixed:\n\n- KVM: VMX: Work around kABI breakage in \u0027enum vmx_l1d_flush_state\u0027 (bsc#1106369).\n- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).\n- KVM: x86: Free vmx_msr_bitmap_longmode while kvm_init failed (bsc#1104367).\n- Refresh patches.xen/xen3-x86-l1tf-04-protect-PROT_NONE-ptes.patch (bsc#1105100).\n- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).\n- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).\n- ptrace: fix PTRACE_LISTEN race corrupting task-\u003estate (bnc#1107001).\n- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources (bsc#1057199)\n- x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).\n- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).\n- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).\n- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).\n- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).\n- xen x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).\n- xen x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).\n- xen, x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).\n- xen: x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).\n", "title": "Description of the patch" }, { "category": "details", "text": "sleposp3-kernel-13799,slessp3-kernel-13799,slexsp3-kernel-13799", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2907-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2907-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182907-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2907-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-September/004617.html" }, { "category": "self", "summary": "SUSE Bug 1057199", "url": "https://bugzilla.suse.com/1057199" }, { "category": "self", "summary": "SUSE Bug 1087081", "url": "https://bugzilla.suse.com/1087081" }, { "category": "self", "summary": "SUSE Bug 1092903", "url": "https://bugzilla.suse.com/1092903" }, { "category": "self", "summary": "SUSE Bug 1102517", "url": "https://bugzilla.suse.com/1102517" }, { "category": "self", "summary": "SUSE Bug 1103119", "url": "https://bugzilla.suse.com/1103119" }, { "category": "self", "summary": "SUSE Bug 1104367", "url": "https://bugzilla.suse.com/1104367" }, { "category": "self", "summary": "SUSE Bug 1104684", "url": "https://bugzilla.suse.com/1104684" }, { "category": "self", "summary": "SUSE Bug 1104818", "url": "https://bugzilla.suse.com/1104818" }, { "category": "self", "summary": "SUSE Bug 1105100", "url": "https://bugzilla.suse.com/1105100" }, { "category": "self", "summary": "SUSE Bug 1105296", "url": "https://bugzilla.suse.com/1105296" }, { "category": "self", "summary": "SUSE Bug 1105322", "url": "https://bugzilla.suse.com/1105322" }, { "category": "self", "summary": "SUSE Bug 1105323", "url": "https://bugzilla.suse.com/1105323" }, { "category": "self", "summary": "SUSE Bug 1105536", "url": "https://bugzilla.suse.com/1105536" }, { "category": "self", "summary": "SUSE Bug 1106369", "url": "https://bugzilla.suse.com/1106369" }, { "category": "self", "summary": "SUSE Bug 1106509", "url": "https://bugzilla.suse.com/1106509" }, { "category": "self", "summary": "SUSE Bug 1106511", "url": "https://bugzilla.suse.com/1106511" }, { "category": "self", "summary": "SUSE Bug 1107001", "url": "https://bugzilla.suse.com/1107001" }, { "category": "self", "summary": "SUSE Bug 1107689", "url": "https://bugzilla.suse.com/1107689" }, { "category": "self", "summary": "SUSE Bug 1108912", "url": "https://bugzilla.suse.com/1108912" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10902 page", "url": "https://www.suse.com/security/cve/CVE-2018-10902/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10940 page", "url": "https://www.suse.com/security/cve/CVE-2018-10940/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14634 page", "url": "https://www.suse.com/security/cve/CVE-2018-14634/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14734 page", "url": "https://www.suse.com/security/cve/CVE-2018-14734/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15572 page", "url": "https://www.suse.com/security/cve/CVE-2018-15572/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16658 page", "url": "https://www.suse.com/security/cve/CVE-2018-16658/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6554 page", "url": "https://www.suse.com/security/cve/CVE-2018-6554/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6555 page", "url": "https://www.suse.com/security/cve/CVE-2018-6555/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-09-27T14:02:27Z", "generator": { "date": "2018-09-27T14:02:27Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2907-1", "initial_release_date": "2018-09-27T14:02:27Z", "revision_history": [ { "date": "2018-09-27T14:02:27Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.106.50.1.i586", "product": { "name": "kernel-default-3.0.101-0.47.106.50.1.i586", "product_id": "kernel-default-3.0.101-0.47.106.50.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.106.50.1.i586", "product": { "name": "kernel-default-base-3.0.101-0.47.106.50.1.i586", "product_id": "kernel-default-base-3.0.101-0.47.106.50.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.106.50.1.i586", "product": { "name": "kernel-default-devel-3.0.101-0.47.106.50.1.i586", "product_id": "kernel-default-devel-3.0.101-0.47.106.50.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.106.50.1.i586", "product": { "name": "kernel-ec2-3.0.101-0.47.106.50.1.i586", "product_id": "kernel-ec2-3.0.101-0.47.106.50.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "product_id": "kernel-ec2-base-3.0.101-0.47.106.50.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "product_id": "kernel-ec2-devel-3.0.101-0.47.106.50.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-0.47.106.50.1.i586", "product": { "name": "kernel-pae-3.0.101-0.47.106.50.1.i586", "product_id": "kernel-pae-3.0.101-0.47.106.50.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-0.47.106.50.1.i586", "product": { "name": "kernel-pae-base-3.0.101-0.47.106.50.1.i586", "product_id": "kernel-pae-base-3.0.101-0.47.106.50.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "product_id": "kernel-pae-devel-3.0.101-0.47.106.50.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.106.50.1.i586", "product": { "name": "kernel-source-3.0.101-0.47.106.50.1.i586", "product_id": "kernel-source-3.0.101-0.47.106.50.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.106.50.1.i586", "product": { "name": "kernel-syms-3.0.101-0.47.106.50.1.i586", "product_id": "kernel-syms-3.0.101-0.47.106.50.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.106.50.1.i586", "product": { "name": "kernel-trace-3.0.101-0.47.106.50.1.i586", "product_id": "kernel-trace-3.0.101-0.47.106.50.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.106.50.1.i586", "product": { "name": "kernel-trace-base-3.0.101-0.47.106.50.1.i586", "product_id": "kernel-trace-base-3.0.101-0.47.106.50.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "product_id": "kernel-trace-devel-3.0.101-0.47.106.50.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.106.50.1.i586", "product": { "name": "kernel-xen-3.0.101-0.47.106.50.1.i586", "product_id": "kernel-xen-3.0.101-0.47.106.50.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.106.50.1.i586", "product": { "name": "kernel-xen-base-3.0.101-0.47.106.50.1.i586", "product_id": "kernel-xen-base-3.0.101-0.47.106.50.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "product_id": "kernel-xen-devel-3.0.101-0.47.106.50.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.106.50.1.s390x", "product": { "name": "kernel-default-3.0.101-0.47.106.50.1.s390x", "product_id": "kernel-default-3.0.101-0.47.106.50.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.106.50.1.s390x", "product": { "name": "kernel-default-base-3.0.101-0.47.106.50.1.s390x", "product_id": "kernel-default-base-3.0.101-0.47.106.50.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "product_id": "kernel-default-devel-3.0.101-0.47.106.50.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-0.47.106.50.1.s390x", "product": { "name": "kernel-default-man-3.0.101-0.47.106.50.1.s390x", "product_id": "kernel-default-man-3.0.101-0.47.106.50.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.106.50.1.s390x", "product": { "name": "kernel-source-3.0.101-0.47.106.50.1.s390x", "product_id": "kernel-source-3.0.101-0.47.106.50.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.106.50.1.s390x", "product": { "name": "kernel-syms-3.0.101-0.47.106.50.1.s390x", "product_id": "kernel-syms-3.0.101-0.47.106.50.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.106.50.1.s390x", "product": { "name": "kernel-trace-3.0.101-0.47.106.50.1.s390x", "product_id": "kernel-trace-3.0.101-0.47.106.50.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "product_id": "kernel-trace-base-3.0.101-0.47.106.50.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "product_id": "kernel-trace-devel-3.0.101-0.47.106.50.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "product": { "name": "kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "product_id": "kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "product": { "name": "kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "product_id": "kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "product": { "name": "kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "product_id": "kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-0.47.106.50.1.x86_64", "product": { "name": "kernel-default-3.0.101-0.47.106.50.1.x86_64", "product_id": "kernel-default-3.0.101-0.47.106.50.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "product_id": "kernel-default-base-3.0.101-0.47.106.50.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "product_id": "kernel-default-devel-3.0.101-0.47.106.50.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "product_id": "kernel-ec2-3.0.101-0.47.106.50.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.106.50.1.x86_64", "product": { "name": "kernel-source-3.0.101-0.47.106.50.1.x86_64", "product_id": "kernel-source-3.0.101-0.47.106.50.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.106.50.1.x86_64", "product": { "name": "kernel-syms-3.0.101-0.47.106.50.1.x86_64", "product_id": "kernel-syms-3.0.101-0.47.106.50.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.106.50.1.x86_64", "product": { "name": "kernel-trace-3.0.101-0.47.106.50.1.x86_64", "product_id": "kernel-trace-3.0.101-0.47.106.50.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "product_id": "kernel-trace-base-3.0.101-0.47.106.50.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.106.50.1.x86_64", "product": { "name": "kernel-xen-3.0.101-0.47.106.50.1.x86_64", "product_id": "kernel-xen-3.0.101-0.47.106.50.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "product_id": "kernel-xen-base-3.0.101-0.47.106.50.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.50.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.47.106.50.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.50.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.106.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.50.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.50.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.50.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.50.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.50.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.47.106.50.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.47.106.50.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.106.50.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.50.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.47.106.50.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.50.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.106.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.50.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.47.106.50.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.50.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.106.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.50.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.47.106.50.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.50.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.106.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.50.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.50.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.50.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.106.50.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.106.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.106.50.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.106.50.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10902" } ], "notes": [ { "category": "general", "text": "It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10902", "url": "https://www.suse.com/security/cve/CVE-2018-10902" }, { "category": "external", "summary": "SUSE Bug 1105322 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105322" }, { "category": "external", "summary": "SUSE Bug 1105323 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T14:02:27Z", "details": "low" } ], "title": "CVE-2018-10902" }, { "cve": "CVE-2018-10940", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10940" } ], "notes": [ { "category": "general", "text": "The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c in the Linux kernel before 4.16.6 allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10940", "url": "https://www.suse.com/security/cve/CVE-2018-10940" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10940", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092903 for CVE-2018-10940", "url": "https://bugzilla.suse.com/1092903" }, { "category": "external", "summary": "SUSE Bug 1107689 for CVE-2018-10940", "url": "https://bugzilla.suse.com/1107689" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-10940", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T14:02:27Z", "details": "moderate" } ], "title": "CVE-2018-10940" }, { "cve": "CVE-2018-14634", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14634" } ], "notes": [ { "category": "general", "text": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14634", "url": "https://www.suse.com/security/cve/CVE-2018-14634" }, { "category": "external", "summary": "SUSE Bug 1108912 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1108912" }, { "category": "external", "summary": "SUSE Bug 1108963 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1108963" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1120323 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1120323" }, { "category": "external", "summary": "SUSE Bug 1122265 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1122265" }, { "category": "external", "summary": "SUSE Bug 1188063 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1188063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T14:02:27Z", "details": "important" } ], "title": "CVE-2018-14634" }, { "cve": "CVE-2018-14734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14734" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14734", "url": "https://www.suse.com/security/cve/CVE-2018-14734" }, { "category": "external", "summary": "SUSE Bug 1103119 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1103119" }, { "category": "external", "summary": "SUSE Bug 1131390 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1131390" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T14:02:27Z", "details": "low" } ], "title": "CVE-2018-14734" }, { "cve": "CVE-2018-15572", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15572" } ], "notes": [ { "category": "general", "text": "The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15572", "url": "https://www.suse.com/security/cve/CVE-2018-15572" }, { "category": "external", "summary": "SUSE Bug 1102517 for CVE-2018-15572", "url": "https://bugzilla.suse.com/1102517" }, { "category": "external", "summary": "SUSE Bug 1105296 for CVE-2018-15572", "url": "https://bugzilla.suse.com/1105296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T14:02:27Z", "details": "important" } ], "title": "CVE-2018-15572" }, { "cve": "CVE-2018-16658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16658" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16658", "url": "https://www.suse.com/security/cve/CVE-2018-16658" }, { "category": "external", "summary": "SUSE Bug 1092903 for CVE-2018-16658", "url": "https://bugzilla.suse.com/1092903" }, { "category": "external", "summary": "SUSE Bug 1107689 for CVE-2018-16658", "url": "https://bugzilla.suse.com/1107689" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-16658", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T14:02:27Z", "details": "low" } ], "title": "CVE-2018-16658" }, { "cve": "CVE-2018-6554", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6554" } ], "notes": [ { "category": "general", "text": "Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6554", "url": "https://www.suse.com/security/cve/CVE-2018-6554" }, { "category": "external", "summary": "SUSE Bug 1106509 for CVE-2018-6554", "url": "https://bugzilla.suse.com/1106509" }, { "category": "external", "summary": "SUSE Bug 1106511 for CVE-2018-6554", "url": "https://bugzilla.suse.com/1106511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T14:02:27Z", "details": "low" } ], "title": "CVE-2018-6554" }, { "cve": "CVE-2018-6555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6555" } ], "notes": [ { "category": "general", "text": "The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6555", "url": "https://www.suse.com/security/cve/CVE-2018-6555" }, { "category": "external", "summary": "SUSE Bug 1106509 for CVE-2018-6555", "url": "https://bugzilla.suse.com/1106509" }, { "category": "external", "summary": "SUSE Bug 1106511 for CVE-2018-6555", "url": "https://bugzilla.suse.com/1106511" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-6555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.50.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.50.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T14:02:27Z", "details": "moderate" } ], "title": "CVE-2018-6555" } ] }
suse-su-2018:3083-1
Vulnerability from csaf_suse
Published
2018-10-09 11:15
Modified
2018-10-09 11:15
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a
local attacker to exploit this vulnerability via a SUID-root binary and obtain
full root privileges (bsc#1108912)
- CVE-2018-14617: Prevent NULL pointer dereference and panic in
hfsplus_lookup() when opening a file (that is purportedly a hard link) in an
hfs+ filesystem that has malformed catalog data, and is mounted read-only
without a metadata directory (bsc#1102870)
- CVE-2018-16276: Incorrect bounds checking in the yurex USB driver in
yurex_read allowed local attackers to use user access read/writes to crash the
kernel or potentially escalate privileges (bsc#1106095)
- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was
caused by the way the overrun accounting works. Depending on interval and
expiry time values, the overrun can be larger than INT_MAX, but the accounting
is int based. This basically made the accounting values, which are visible to
user space via timer_getoverrun(2) and siginfo::si_overrun, random. This
allowed a local user to cause a denial of service (signed integer overflow) via
crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922)
- CVE-2018-13093: Prevent NULL pointer dereference and panic in lookup_slow()
on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image.
This occured because of a lack of proper validation that cached inodes are free
during allocation (bnc#1100001)
- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local
attackers to use a incorrect bounds check in the CDROM driver
CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that
could have been used by local attackers to read kernel memory (bnc#1107689)
- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a
denial of service (ias_object use-after-free and system crash) or possibly have
unspecified other impact via an AF_IRDA socket (bnc#1106511)
- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed
local users to cause a denial of service (memory consumption) by repeatedly
binding an AF_IRDA socket (bnc#1106509)
- CVE-2018-10853: The KVM hypervisor did not check current privilege(CPL) level
while emulating unprivileged instructions. An unprivileged guest user/process
could have used this flaw to potentially escalate privileges inside guest
(bsc#1097104)
- CVE-2018-10902: Protect against concurrent access to prevent double realloc
(double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A
malicious local attacker could have used this for privilege escalation
(bnc#1105322).
- CVE-2018-10879: A local user could have caused a use-after-free in
ext4_xattr_set_entry function and a denial of service or unspecified other
impact by renaming a file in a crafted ext4 filesystem image (bsc#1099844)
- CVE-2018-10883: A local user could have caused an out-of-bounds write in
jbd2_journal_dirty_metadata(), a denial of service, and a system crash by
mounting and operating on a crafted ext4 filesystem image (bsc#1099863)
- CVE-2018-10880: Prevent stack-out-of-bounds write in the ext4 filesystem code
when mounting and writing to a crafted ext4 image in ext4_update_inline_data().
An attacker could have used this to cause a system crash and a denial of
service (bsc#1099845)
- CVE-2018-10882: A local user could have caused an out-of-bound write, a
denial of service, and a system crash by unmounting a crafted ext4 filesystem
image (bsc#1099849)
- CVE-2018-10881: A local user could have caused an out-of-bound access in
ext4_get_group_info function, a denial of service, and a system crash by
mounting and operating on a crafted ext4 filesystem image (bsc#1099864)
- CVE-2018-10877: Prevent out-of-bound access in the ext4_ext_drop_refs()
function when operating on a crafted ext4 filesystem image (bsc#1099846)
- CVE-2018-10876: A use-after-free was possible in ext4_ext_remove_space()
function when mounting and operating a crafted ext4 image (bsc#1099811)
- CVE-2018-10878: A local user could have caused an out-of-bounds write and a
denial of service or unspecified other impact by mounting and operating a
crafted ext4 filesystem image (bsc#1099813)
- CVE-2018-17182: An issue was discovered in the Linux kernel The
vmacache_flush_all function in mm/vmacache.c mishandled sequence number
overflows. An attacker can trigger a use-after-free (and possibly gain
privileges) via certain thread creation, map, unmap, invalidation,
and dereference operations (bnc#1108399).
The following non-security bugs were fixed:
- bcache: avoid unncessary cache prefetch bch_btree_node_get().
- bcache: calculate the number of incremental GC nodes according to the total of btree nodes.
- bcache: display rate debug parameters to 0 when writeback is not running.
- bcache: do not check return value of debugfs_create_dir().
- bcache: finish incremental GC.
- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064232).
- bcache: fix I/O significant decline while backend devices registering.
- bcache: free heap cache_set->flush_btree in bch_journal_free.
- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section.
- bcache: release dc->writeback_lock properly in bch_writeback_thread().
- bcache: set max writeback rate when I/O request is idle (bsc#1064232).
- bcache: simplify the calculation of the total amount of flash dirty data.
- Do not report CPU affected by L1TF when ARCH_CAP_RDCL_NO bit is set (bsc#1104906).
- ext4: check for allocation block validity with block group locked (bsc#1104495).
- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).
- kABI: protect struct x86_emulate_ops (kabi).
- KEYS: prevent creating a different user's keyrings (bnc#1065999).
- KVM: MMU: always terminate page walks at level 1 (bsc#1062604).
- KVM: MMU: simplify last_pte_bitmap (bsc#1062604).
- KVM: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).
- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- updated sssbd handling (bsc#1093215, bsc#1105412).
- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).
- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).
- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).
Patchnames
SUSE-SLE-Module-Public-Cloud-12-2018-2185,SUSE-SLE-SERVER-12-2018-2185
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a\n local attacker to exploit this vulnerability via a SUID-root binary and obtain\n full root privileges (bsc#1108912)\n- CVE-2018-14617: Prevent NULL pointer dereference and panic in\n hfsplus_lookup() when opening a file (that is purportedly a hard link) in an\n hfs+ filesystem that has malformed catalog data, and is mounted read-only\n without a metadata directory (bsc#1102870)\n- CVE-2018-16276: Incorrect bounds checking in the yurex USB driver in\n yurex_read allowed local attackers to use user access read/writes to crash the\n kernel or potentially escalate privileges (bsc#1106095)\n- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was\n caused by the way the overrun accounting works. Depending on interval and\n expiry time values, the overrun can be larger than INT_MAX, but the accounting\n is int based. This basically made the accounting values, which are visible to\n user space via timer_getoverrun(2) and siginfo::si_overrun, random. This\n allowed a local user to cause a denial of service (signed integer overflow) via\n crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922)\n- CVE-2018-13093: Prevent NULL pointer dereference and panic in lookup_slow()\n on a NULL inode-\u003ei_ops pointer when doing pathwalks on a corrupted xfs image.\n This occured because of a lack of proper validation that cached inodes are free\n during allocation (bnc#1100001)\n- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local\n attackers to use a incorrect bounds check in the CDROM driver\n CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)\n- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that\n could have been used by local attackers to read kernel memory (bnc#1107689)\n- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a\n denial of service (ias_object use-after-free and system crash) or possibly have\n unspecified other impact via an AF_IRDA socket (bnc#1106511)\n- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed\n local users to cause a denial of service (memory consumption) by repeatedly\n binding an AF_IRDA socket (bnc#1106509)\n- CVE-2018-10853: The KVM hypervisor did not check current privilege(CPL) level\n while emulating unprivileged instructions. An unprivileged guest user/process\n could have used this flaw to potentially escalate privileges inside guest\n (bsc#1097104)\n- CVE-2018-10902: Protect against concurrent access to prevent double realloc\n (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A\n malicious local attacker could have used this for privilege escalation\n (bnc#1105322).\n- CVE-2018-10879: A local user could have caused a use-after-free in\n ext4_xattr_set_entry function and a denial of service or unspecified other\n impact by renaming a file in a crafted ext4 filesystem image (bsc#1099844)\n- CVE-2018-10883: A local user could have caused an out-of-bounds write in\n jbd2_journal_dirty_metadata(), a denial of service, and a system crash by\n mounting and operating on a crafted ext4 filesystem image (bsc#1099863)\n- CVE-2018-10880: Prevent stack-out-of-bounds write in the ext4 filesystem code\n when mounting and writing to a crafted ext4 image in ext4_update_inline_data().\n An attacker could have used this to cause a system crash and a denial of\n service (bsc#1099845)\n- CVE-2018-10882: A local user could have caused an out-of-bound write, a\n denial of service, and a system crash by unmounting a crafted ext4 filesystem\n image (bsc#1099849)\n- CVE-2018-10881: A local user could have caused an out-of-bound access in\n ext4_get_group_info function, a denial of service, and a system crash by\n mounting and operating on a crafted ext4 filesystem image (bsc#1099864)\n- CVE-2018-10877: Prevent out-of-bound access in the ext4_ext_drop_refs()\n function when operating on a crafted ext4 filesystem image (bsc#1099846)\n- CVE-2018-10876: A use-after-free was possible in ext4_ext_remove_space()\n function when mounting and operating a crafted ext4 image (bsc#1099811)\n- CVE-2018-10878: A local user could have caused an out-of-bounds write and a\n denial of service or unspecified other impact by mounting and operating a\n crafted ext4 filesystem image (bsc#1099813)\n- CVE-2018-17182: An issue was discovered in the Linux kernel The\n vmacache_flush_all function in mm/vmacache.c mishandled sequence number\n overflows. An attacker can trigger a use-after-free (and possibly gain\n privileges) via certain thread creation, map, unmap, invalidation,\n and dereference operations (bnc#1108399).\n\nThe following non-security bugs were fixed:\n\n- bcache: avoid unncessary cache prefetch bch_btree_node_get().\n- bcache: calculate the number of incremental GC nodes according to the total of btree nodes.\n- bcache: display rate debug parameters to 0 when writeback is not running.\n- bcache: do not check return value of debugfs_create_dir().\n- bcache: finish incremental GC.\n- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064232).\n- bcache: fix I/O significant decline while backend devices registering.\n- bcache: free heap cache_set-\u003eflush_btree in bch_journal_free.\n- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section.\n- bcache: release dc-\u003ewriteback_lock properly in bch_writeback_thread().\n- bcache: set max writeback rate when I/O request is idle (bsc#1064232).\n- bcache: simplify the calculation of the total amount of flash dirty data.\n- Do not report CPU affected by L1TF when ARCH_CAP_RDCL_NO bit is set (bsc#1104906).\n- ext4: check for allocation block validity with block group locked (bsc#1104495).\n- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).\n- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).\n- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).\n- kABI: protect struct x86_emulate_ops (kabi).\n- KEYS: prevent creating a different user\u0027s keyrings (bnc#1065999).\n- KVM: MMU: always terminate page walks at level 1 (bsc#1062604).\n- KVM: MMU: simplify last_pte_bitmap (bsc#1062604).\n- KVM: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).\n- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).\n- KVM: VMX: Work around kABI breakage in \u0027enum vmx_l1d_flush_state\u0027 (bsc#1106369).\n- updated sssbd handling (bsc#1093215, bsc#1105412).\n- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).\n- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).\n- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Public-Cloud-12-2018-2185,SUSE-SLE-SERVER-12-2018-2185", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3083-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:3083-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183083-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:3083-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1062604", "url": "https://bugzilla.suse.com/1062604" }, { "category": "self", "summary": "SUSE Bug 1064232", "url": "https://bugzilla.suse.com/1064232" }, { "category": "self", "summary": "SUSE Bug 1065999", "url": "https://bugzilla.suse.com/1065999" }, { "category": "self", "summary": "SUSE Bug 1092903", "url": "https://bugzilla.suse.com/1092903" }, { "category": "self", "summary": "SUSE Bug 1093215", "url": "https://bugzilla.suse.com/1093215" }, { "category": "self", "summary": "SUSE Bug 1096547", "url": "https://bugzilla.suse.com/1096547" }, { "category": "self", "summary": "SUSE Bug 1097104", "url": "https://bugzilla.suse.com/1097104" }, { "category": "self", "summary": "SUSE Bug 1099811", "url": "https://bugzilla.suse.com/1099811" }, { "category": "self", "summary": "SUSE Bug 1099813", "url": "https://bugzilla.suse.com/1099813" }, { "category": "self", "summary": "SUSE Bug 1099844", "url": "https://bugzilla.suse.com/1099844" }, { "category": "self", "summary": "SUSE Bug 1099845", "url": "https://bugzilla.suse.com/1099845" }, { "category": "self", "summary": "SUSE Bug 1099846", "url": "https://bugzilla.suse.com/1099846" }, { "category": "self", "summary": "SUSE Bug 1099849", "url": "https://bugzilla.suse.com/1099849" }, { "category": "self", "summary": "SUSE Bug 1099863", "url": "https://bugzilla.suse.com/1099863" }, { "category": "self", "summary": "SUSE Bug 1099864", "url": "https://bugzilla.suse.com/1099864" }, { "category": "self", "summary": "SUSE Bug 1099922", "url": "https://bugzilla.suse.com/1099922" }, { "category": "self", "summary": "SUSE Bug 1100001", "url": "https://bugzilla.suse.com/1100001" }, { "category": "self", "summary": "SUSE Bug 1100089", "url": "https://bugzilla.suse.com/1100089" }, { "category": "self", "summary": "SUSE Bug 1102870", "url": "https://bugzilla.suse.com/1102870" }, { "category": "self", "summary": "SUSE Bug 1103445", "url": "https://bugzilla.suse.com/1103445" }, { "category": "self", "summary": "SUSE Bug 1104319", "url": "https://bugzilla.suse.com/1104319" }, { "category": "self", "summary": "SUSE Bug 1104495", "url": "https://bugzilla.suse.com/1104495" }, { "category": "self", "summary": "SUSE Bug 1104906", "url": "https://bugzilla.suse.com/1104906" }, { "category": "self", "summary": "SUSE Bug 1105322", "url": "https://bugzilla.suse.com/1105322" }, { "category": "self", "summary": "SUSE Bug 1105412", "url": "https://bugzilla.suse.com/1105412" }, { "category": "self", "summary": "SUSE Bug 1106095", "url": "https://bugzilla.suse.com/1106095" }, { "category": "self", "summary": "SUSE Bug 1106369", "url": "https://bugzilla.suse.com/1106369" }, { "category": "self", "summary": "SUSE Bug 1106509", "url": "https://bugzilla.suse.com/1106509" }, { "category": "self", "summary": "SUSE Bug 1106511", "url": "https://bugzilla.suse.com/1106511" }, { "category": "self", "summary": "SUSE Bug 1107689", "url": "https://bugzilla.suse.com/1107689" }, { "category": "self", "summary": "SUSE Bug 1108399", "url": "https://bugzilla.suse.com/1108399" }, { "category": "self", "summary": "SUSE Bug 1108912", "url": "https://bugzilla.suse.com/1108912" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10876 page", "url": "https://www.suse.com/security/cve/CVE-2018-10876/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10877 page", "url": "https://www.suse.com/security/cve/CVE-2018-10877/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10878 page", "url": "https://www.suse.com/security/cve/CVE-2018-10878/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10879 page", "url": "https://www.suse.com/security/cve/CVE-2018-10879/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10880 page", "url": "https://www.suse.com/security/cve/CVE-2018-10880/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10881 page", "url": "https://www.suse.com/security/cve/CVE-2018-10881/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10882 page", "url": "https://www.suse.com/security/cve/CVE-2018-10882/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10883 page", "url": "https://www.suse.com/security/cve/CVE-2018-10883/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10902 page", "url": "https://www.suse.com/security/cve/CVE-2018-10902/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10940 page", "url": "https://www.suse.com/security/cve/CVE-2018-10940/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12896 page", "url": "https://www.suse.com/security/cve/CVE-2018-12896/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13093 page", "url": "https://www.suse.com/security/cve/CVE-2018-13093/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14617 page", "url": "https://www.suse.com/security/cve/CVE-2018-14617/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14634 page", "url": "https://www.suse.com/security/cve/CVE-2018-14634/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16276 page", "url": "https://www.suse.com/security/cve/CVE-2018-16276/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16658 page", "url": "https://www.suse.com/security/cve/CVE-2018-16658/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17182 page", "url": "https://www.suse.com/security/cve/CVE-2018-17182/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6554 page", "url": "https://www.suse.com/security/cve/CVE-2018-6554/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6555 page", "url": "https://www.suse.com/security/cve/CVE-2018-6555/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-10-09T11:15:29Z", "generator": { "date": "2018-10-09T11:15:29Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:3083-1", "initial_release_date": "2018-10-09T11:15:29Z", "revision_history": [ { "date": "2018-10-09T11:15:29Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.61-52.146.1.noarch", "product": { "name": "kernel-devel-3.12.61-52.146.1.noarch", "product_id": "kernel-devel-3.12.61-52.146.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.61-52.146.1.noarch", "product": { "name": "kernel-macros-3.12.61-52.146.1.noarch", "product_id": "kernel-macros-3.12.61-52.146.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.61-52.146.1.noarch", "product": { "name": "kernel-source-3.12.61-52.146.1.noarch", "product_id": "kernel-source-3.12.61-52.146.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.61-52.146.1.ppc64le", "product": { "name": "kernel-default-3.12.61-52.146.1.ppc64le", "product_id": "kernel-default-3.12.61-52.146.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.146.1.ppc64le", "product": { "name": "kernel-default-base-3.12.61-52.146.1.ppc64le", "product_id": "kernel-default-base-3.12.61-52.146.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.146.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.61-52.146.1.ppc64le", "product_id": "kernel-default-devel-3.12.61-52.146.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.146.1.ppc64le", "product": { "name": "kernel-syms-3.12.61-52.146.1.ppc64le", "product_id": "kernel-syms-3.12.61-52.146.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.61-52.146.1.s390x", "product": { "name": "kernel-default-3.12.61-52.146.1.s390x", "product_id": "kernel-default-3.12.61-52.146.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.146.1.s390x", "product": { "name": "kernel-default-base-3.12.61-52.146.1.s390x", "product_id": "kernel-default-base-3.12.61-52.146.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.146.1.s390x", "product": { "name": "kernel-default-devel-3.12.61-52.146.1.s390x", "product_id": "kernel-default-devel-3.12.61-52.146.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.61-52.146.1.s390x", "product": { "name": "kernel-default-man-3.12.61-52.146.1.s390x", "product_id": "kernel-default-man-3.12.61-52.146.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.146.1.s390x", "product": { "name": "kernel-syms-3.12.61-52.146.1.s390x", "product_id": "kernel-syms-3.12.61-52.146.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-ec2-3.12.61-52.146.1.x86_64", "product": { "name": "kernel-ec2-3.12.61-52.146.1.x86_64", "product_id": "kernel-ec2-3.12.61-52.146.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.61-52.146.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.61-52.146.1.x86_64", "product_id": "kernel-ec2-devel-3.12.61-52.146.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.61-52.146.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.61-52.146.1.x86_64", "product_id": "kernel-ec2-extra-3.12.61-52.146.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.12.61-52.146.1.x86_64", "product": { "name": "kernel-default-3.12.61-52.146.1.x86_64", "product_id": "kernel-default-3.12.61-52.146.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.146.1.x86_64", "product": { "name": "kernel-default-base-3.12.61-52.146.1.x86_64", "product_id": "kernel-default-base-3.12.61-52.146.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.146.1.x86_64", "product": { "name": "kernel-default-devel-3.12.61-52.146.1.x86_64", "product_id": "kernel-default-devel-3.12.61-52.146.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.146.1.x86_64", "product": { "name": "kernel-syms-3.12.61-52.146.1.x86_64", "product_id": "kernel-syms-3.12.61-52.146.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.61-52.146.1.x86_64", "product": { "name": "kernel-xen-3.12.61-52.146.1.x86_64", "product_id": "kernel-xen-3.12.61-52.146.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.61-52.146.1.x86_64", "product": { "name": "kernel-xen-base-3.12.61-52.146.1.x86_64", "product_id": "kernel-xen-base-3.12.61-52.146.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.61-52.146.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.61-52.146.1.x86_64", "product_id": "kernel-xen-devel-3.12.61-52.146.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.61-52.146.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64" }, "product_reference": "kernel-ec2-3.12.61-52.146.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.61-52.146.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.61-52.146.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.61-52.146.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.61-52.146.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.146.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le" }, "product_reference": "kernel-default-3.12.61-52.146.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.146.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x" }, "product_reference": "kernel-default-3.12.61-52.146.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.146.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64" }, "product_reference": "kernel-default-3.12.61-52.146.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.146.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.61-52.146.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.146.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x" }, "product_reference": "kernel-default-base-3.12.61-52.146.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.146.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64" }, "product_reference": "kernel-default-base-3.12.61-52.146.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.146.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.61-52.146.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.146.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x" }, "product_reference": "kernel-default-devel-3.12.61-52.146.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.146.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.61-52.146.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.61-52.146.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x" }, "product_reference": "kernel-default-man-3.12.61-52.146.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.61-52.146.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch" }, "product_reference": "kernel-devel-3.12.61-52.146.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.61-52.146.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch" }, "product_reference": "kernel-macros-3.12.61-52.146.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.61-52.146.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch" }, "product_reference": "kernel-source-3.12.61-52.146.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.146.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le" }, "product_reference": "kernel-syms-3.12.61-52.146.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.146.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x" }, "product_reference": "kernel-syms-3.12.61-52.146.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.146.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64" }, "product_reference": "kernel-syms-3.12.61-52.146.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.61-52.146.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64" }, "product_reference": "kernel-xen-3.12.61-52.146.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.61-52.146.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.61-52.146.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.61-52.146.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.61-52.146.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:15:29Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-10876", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10876" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10876", "url": "https://www.suse.com/security/cve/CVE-2018-10876" }, { "category": "external", "summary": "SUSE Bug 1099811 for CVE-2018-10876", "url": "https://bugzilla.suse.com/1099811" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:15:29Z", "details": "moderate" } ], "title": "CVE-2018-10876" }, { "cve": "CVE-2018-10877", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10877" } ], "notes": [ { "category": "general", "text": "Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10877", "url": "https://www.suse.com/security/cve/CVE-2018-10877" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10877", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099846 for CVE-2018-10877", "url": "https://bugzilla.suse.com/1099846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:15:29Z", "details": "moderate" } ], "title": "CVE-2018-10877" }, { "cve": "CVE-2018-10878", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10878" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10878", "url": "https://www.suse.com/security/cve/CVE-2018-10878" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10878", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099813 for CVE-2018-10878", "url": "https://bugzilla.suse.com/1099813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:15:29Z", "details": "moderate" } ], "title": "CVE-2018-10878" }, { "cve": "CVE-2018-10879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10879" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10879", "url": "https://www.suse.com/security/cve/CVE-2018-10879" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10879", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099844 for CVE-2018-10879", "url": "https://bugzilla.suse.com/1099844" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:15:29Z", "details": "moderate" } ], "title": "CVE-2018-10879" }, { "cve": "CVE-2018-10880", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10880" } ], "notes": [ { "category": "general", "text": "Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10880", "url": "https://www.suse.com/security/cve/CVE-2018-10880" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10880", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099845 for CVE-2018-10880", "url": "https://bugzilla.suse.com/1099845" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:15:29Z", "details": "moderate" } ], "title": "CVE-2018-10880" }, { "cve": "CVE-2018-10881", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10881" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10881", "url": "https://www.suse.com/security/cve/CVE-2018-10881" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10881", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099864 for CVE-2018-10881", "url": "https://bugzilla.suse.com/1099864" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:15:29Z", "details": "moderate" } ], "title": "CVE-2018-10881" }, { "cve": "CVE-2018-10882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10882" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10882", "url": "https://www.suse.com/security/cve/CVE-2018-10882" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10882", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099849 for CVE-2018-10882", "url": "https://bugzilla.suse.com/1099849" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:15:29Z", "details": "moderate" } ], "title": "CVE-2018-10882" }, { "cve": "CVE-2018-10883", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10883" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10883", "url": "https://www.suse.com/security/cve/CVE-2018-10883" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10883", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099863 for CVE-2018-10883", "url": "https://bugzilla.suse.com/1099863" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:15:29Z", "details": "moderate" } ], "title": "CVE-2018-10883" }, { "cve": "CVE-2018-10902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10902" } ], "notes": [ { "category": "general", "text": "It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10902", "url": "https://www.suse.com/security/cve/CVE-2018-10902" }, { "category": "external", "summary": "SUSE Bug 1105322 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105322" }, { "category": "external", "summary": "SUSE Bug 1105323 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:15:29Z", "details": "low" } ], "title": "CVE-2018-10902" }, { "cve": "CVE-2018-10940", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10940" } ], "notes": [ { "category": "general", "text": "The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c in the Linux kernel before 4.16.6 allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10940", "url": "https://www.suse.com/security/cve/CVE-2018-10940" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10940", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092903 for CVE-2018-10940", "url": "https://bugzilla.suse.com/1092903" }, { "category": "external", "summary": "SUSE Bug 1107689 for CVE-2018-10940", "url": "https://bugzilla.suse.com/1107689" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-10940", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:15:29Z", "details": "moderate" } ], "title": "CVE-2018-10940" }, { "cve": "CVE-2018-12896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12896" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12896", "url": "https://www.suse.com/security/cve/CVE-2018-12896" }, { "category": "external", "summary": "SUSE Bug 1099922 for CVE-2018-12896", "url": "https://bugzilla.suse.com/1099922" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:15:29Z", "details": "low" } ], "title": "CVE-2018-12896" }, { "cve": "CVE-2018-13093", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13093" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/xfs/xfs_icache.c in the Linux kernel through 4.17.3. There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode-\u003ei_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13093", "url": "https://www.suse.com/security/cve/CVE-2018-13093" }, { "category": "external", "summary": "SUSE Bug 1100001 for CVE-2018-13093", "url": "https://bugzilla.suse.com/1100001" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:15:29Z", "details": "moderate" } ], "title": "CVE-2018-13093" }, { "cve": "CVE-2018-14617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14617" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14617", "url": "https://www.suse.com/security/cve/CVE-2018-14617" }, { "category": "external", "summary": "SUSE Bug 1102870 for CVE-2018-14617", "url": "https://bugzilla.suse.com/1102870" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:15:29Z", "details": "moderate" } ], "title": "CVE-2018-14617" }, { "cve": "CVE-2018-14634", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14634" } ], "notes": [ { "category": "general", "text": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14634", "url": "https://www.suse.com/security/cve/CVE-2018-14634" }, { "category": "external", "summary": "SUSE Bug 1108912 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1108912" }, { "category": "external", "summary": "SUSE Bug 1108963 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1108963" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1120323 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1120323" }, { "category": "external", "summary": "SUSE Bug 1122265 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1122265" }, { "category": "external", "summary": "SUSE Bug 1188063 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1188063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:15:29Z", "details": "important" } ], "title": "CVE-2018-14634" }, { "cve": "CVE-2018-16276", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16276" } ], "notes": [ { "category": "general", "text": "An issue was discovered in yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7. Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16276", "url": "https://www.suse.com/security/cve/CVE-2018-16276" }, { "category": "external", "summary": "SUSE Bug 1106095 for CVE-2018-16276", "url": "https://bugzilla.suse.com/1106095" }, { "category": "external", "summary": "SUSE Bug 1115593 for CVE-2018-16276", "url": "https://bugzilla.suse.com/1115593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:15:29Z", "details": "important" } ], "title": "CVE-2018-16276" }, { "cve": "CVE-2018-16658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16658" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16658", "url": "https://www.suse.com/security/cve/CVE-2018-16658" }, { "category": "external", "summary": "SUSE Bug 1092903 for CVE-2018-16658", "url": "https://bugzilla.suse.com/1092903" }, { "category": "external", "summary": "SUSE Bug 1107689 for CVE-2018-16658", "url": "https://bugzilla.suse.com/1107689" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-16658", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:15:29Z", "details": "low" } ], "title": "CVE-2018-16658" }, { "cve": "CVE-2018-17182", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-17182" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-17182", "url": "https://www.suse.com/security/cve/CVE-2018-17182" }, { "category": "external", "summary": "SUSE Bug 1108399 for CVE-2018-17182", "url": "https://bugzilla.suse.com/1108399" }, { "category": "external", "summary": "SUSE Bug 1110233 for CVE-2018-17182", "url": "https://bugzilla.suse.com/1110233" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:15:29Z", "details": "moderate" } ], "title": "CVE-2018-17182" }, { "cve": "CVE-2018-6554", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6554" } ], "notes": [ { "category": "general", "text": "Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6554", "url": "https://www.suse.com/security/cve/CVE-2018-6554" }, { "category": "external", "summary": "SUSE Bug 1106509 for CVE-2018-6554", "url": "https://bugzilla.suse.com/1106509" }, { "category": "external", "summary": "SUSE Bug 1106511 for CVE-2018-6554", "url": "https://bugzilla.suse.com/1106511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:15:29Z", "details": "low" } ], "title": "CVE-2018-6554" }, { "cve": "CVE-2018-6555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6555" } ], "notes": [ { "category": "general", "text": "The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6555", "url": "https://www.suse.com/security/cve/CVE-2018-6555" }, { "category": "external", "summary": "SUSE Bug 1106509 for CVE-2018-6555", "url": "https://bugzilla.suse.com/1106509" }, { "category": "external", "summary": "SUSE Bug 1106511 for CVE-2018-6555", "url": "https://bugzilla.suse.com/1106511" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-6555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:15:29Z", "details": "moderate" } ], "title": "CVE-2018-6555" } ] }
suse-su-2018:2908-1
Vulnerability from csaf_suse
Published
2018-09-27 15:01
Modified
2018-09-27 15:01
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 kernel was updated receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a
local attacker to exploit this vulnerability via a SUID-root binary and obtain
full root privileges (bsc#1108912)
- CVE-2018-14617: Prevent NULL pointer dereference and panic in
hfsplus_lookup() when opening a file (that is purportedly a hard link) in an
hfs+ filesystem that has malformed catalog data, and is mounted read-only
without a metadata directory (bsc#1102870)
- CVE-2018-16276: Incorrect bounds checking in the yurex USB driver in
yurex_read allowed local attackers to use user access read/writes to crash the
kernel or potentially escalate privileges (bsc#1106095)
- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was
caused by the way the overrun accounting works. Depending on interval and
expiry time values, the overrun can be larger than INT_MAX, but the accounting
is int based. This basically made the accounting values, which are visible to
user space via timer_getoverrun(2) and siginfo::si_overrun, random. This
allowed a local user to cause a denial of service (signed integer overflow) via
crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922)
- CVE-2018-13093: Prevent NULL pointer dereference and panic in lookup_slow()
on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image.
This occured because of a lack of proper validation that cached inodes are free
during allocation (bnc#1100001)
- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local
attackers to use a incorrect bounds check in the CDROM driver
CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that
could have been used by local attackers to read kernel memory (bnc#1107689)
- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a
denial of service (ias_object use-after-free and system crash) or possibly have
unspecified other impact via an AF_IRDA socket (bnc#1106511)
- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed
local users to cause a denial of service (memory consumption) by repeatedly
binding an AF_IRDA socket (bnc#1106509)
- CVE-2018-10902: Protect against concurrent access to prevent double realloc
(double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A
malicious local attacker could have used this for privilege escalation
(bnc#1105322)
- CVE-2018-10879: A local user could have caused a use-after-free in
ext4_xattr_set_entry function and a denial of service or unspecified other
impact by renaming a file in a crafted ext4 filesystem image (bsc#1099844)
- CVE-2018-10883: A local user could have caused an out-of-bounds write in
jbd2_journal_dirty_metadata(), a denial of service, and a system crash by
mounting and operating on a crafted ext4 filesystem image (bsc#1099863)
- CVE-2018-10880: Prevent stack-out-of-bounds write in the ext4 filesystem code
when mounting and writing to a crafted ext4 image in ext4_update_inline_data().
An attacker could have used this to cause a system crash and a denial of
service (bsc#1099845)
- CVE-2018-10882: A local user could have caused an out-of-bound write, a
denial of service, and a system crash by unmounting a crafted ext4 filesystem
image (bsc#1099849)
- CVE-2018-10881: A local user could have caused an out-of-bound access in
ext4_get_group_info function, a denial of service, and a system crash by
mounting and operating on a crafted ext4 filesystem image (bsc#1099864)
- CVE-2018-10877: Prevent out-of-bound access in the ext4_ext_drop_refs()
function when operating on a crafted ext4 filesystem image (bsc#1099846)
- CVE-2018-10876: A use-after-free was possible in ext4_ext_remove_space()
function when mounting and operating a crafted ext4 image (bsc#1099811)
- CVE-2018-10878: A local user could have caused an out-of-bounds write and a
denial of service or unspecified other impact by mounting and operating a
crafted ext4 filesystem image (bsc#1099813)
- CVE-2018-10853: The KVM hypervisor did not check current privilege(CPL) level
while emulating unprivileged instructions. An unprivileged guest user/process
could have used this flaw to potentially escalate privileges inside guest
(bsc#1097104).
The following non-security bugs were fixed:
- KEYS: prevent creating a different user's keyrings (bnc#1065999).
- KVM: MMU: always terminate page walks at level 1 (bsc#1062604).
- KVM: MMU: simplify last_pte_bitmap (bsc#1062604).
- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- KVM: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).
- Refresh patches.xen/xen3-x86-l1tf-04-protect-PROT_NONE-ptes.patch (bsc#1105100).
- Do not report CPU affected by L1TF when ARCH_CAP_RDCL_NO bit is set (bsc#1104906).
- Revert '- Disable patches.arch/x86-mm-Simplify-p-g4um-d_page-macros.patch' (bnc#1104818)
- bcache: avoid unncessary cache prefetch bch_btree_node_get().
- bcache: calculate the number of incremental GC nodes according to the total of btree nodes.
- bcache: display rate debug parameters to 0 when writeback is not running.
- bcache: do not check return value of debugfs_create_dir().
- bcache: finish incremental GC.
- bcache: fix I/O significant decline while backend devices registering.
- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064233).
- bcache: free heap cache_set->flush_btree in bch_journal_free.
- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section.
- bcache: release dc->writeback_lock properly in bch_writeback_thread().
- bcache: set max writeback rate when I/O request is idle (bsc#1064233).
- bcache: simplify the calculation of the total amount of flash dirty data.
- cifs: Fix infinite loop when using hard mount option (bsc#1091171).
- ext4: check for allocation block validity with block group locked (bsc#1104495).
- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).
- restore cond_resched() in shrink_dcache_parent().
- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).
- x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104818).
- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).
- xen, x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104818).
- xfs: Remove dead code from inode recover function (bsc#1105396).
- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).
- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).
- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).
- xfs: protect inode ->di_dmstate with a spinlock (bsc#1024788).
- xfs: repair malformed inode items during log recovery (bsc#1105396).
Patchnames
SUSE-SLE-Module-Public-Cloud-12-2018-2063,SUSE-SLE-SERVER-12-SP1-2018-2063
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP1 kernel was updated receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a\n local attacker to exploit this vulnerability via a SUID-root binary and obtain\n full root privileges (bsc#1108912)\n- CVE-2018-14617: Prevent NULL pointer dereference and panic in\n hfsplus_lookup() when opening a file (that is purportedly a hard link) in an\n hfs+ filesystem that has malformed catalog data, and is mounted read-only\n without a metadata directory (bsc#1102870)\n- CVE-2018-16276: Incorrect bounds checking in the yurex USB driver in\n yurex_read allowed local attackers to use user access read/writes to crash the\n kernel or potentially escalate privileges (bsc#1106095)\n- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was\n caused by the way the overrun accounting works. Depending on interval and\n expiry time values, the overrun can be larger than INT_MAX, but the accounting\n is int based. This basically made the accounting values, which are visible to\n user space via timer_getoverrun(2) and siginfo::si_overrun, random. This\n allowed a local user to cause a denial of service (signed integer overflow) via\n crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922)\n- CVE-2018-13093: Prevent NULL pointer dereference and panic in lookup_slow()\n on a NULL inode-\u003ei_ops pointer when doing pathwalks on a corrupted xfs image.\n This occured because of a lack of proper validation that cached inodes are free\n during allocation (bnc#1100001)\n- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local\n attackers to use a incorrect bounds check in the CDROM driver\n CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)\n- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that\n could have been used by local attackers to read kernel memory (bnc#1107689)\n- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a\n denial of service (ias_object use-after-free and system crash) or possibly have\n unspecified other impact via an AF_IRDA socket (bnc#1106511)\n- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed\n local users to cause a denial of service (memory consumption) by repeatedly\n binding an AF_IRDA socket (bnc#1106509)\n- CVE-2018-10902: Protect against concurrent access to prevent double realloc\n (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A\n malicious local attacker could have used this for privilege escalation\n (bnc#1105322)\n- CVE-2018-10879: A local user could have caused a use-after-free in\n ext4_xattr_set_entry function and a denial of service or unspecified other\n impact by renaming a file in a crafted ext4 filesystem image (bsc#1099844)\n- CVE-2018-10883: A local user could have caused an out-of-bounds write in\n jbd2_journal_dirty_metadata(), a denial of service, and a system crash by\n mounting and operating on a crafted ext4 filesystem image (bsc#1099863)\n- CVE-2018-10880: Prevent stack-out-of-bounds write in the ext4 filesystem code\n when mounting and writing to a crafted ext4 image in ext4_update_inline_data().\n An attacker could have used this to cause a system crash and a denial of\n service (bsc#1099845)\n- CVE-2018-10882: A local user could have caused an out-of-bound write, a\n denial of service, and a system crash by unmounting a crafted ext4 filesystem\n image (bsc#1099849)\n- CVE-2018-10881: A local user could have caused an out-of-bound access in\n ext4_get_group_info function, a denial of service, and a system crash by\n mounting and operating on a crafted ext4 filesystem image (bsc#1099864)\n- CVE-2018-10877: Prevent out-of-bound access in the ext4_ext_drop_refs()\n function when operating on a crafted ext4 filesystem image (bsc#1099846)\n- CVE-2018-10876: A use-after-free was possible in ext4_ext_remove_space()\n function when mounting and operating a crafted ext4 image (bsc#1099811)\n- CVE-2018-10878: A local user could have caused an out-of-bounds write and a\n denial of service or unspecified other impact by mounting and operating a\n crafted ext4 filesystem image (bsc#1099813)\n- CVE-2018-10853: The KVM hypervisor did not check current privilege(CPL) level\n while emulating unprivileged instructions. An unprivileged guest user/process\n could have used this flaw to potentially escalate privileges inside guest\n (bsc#1097104).\n\nThe following non-security bugs were fixed:\n\n- KEYS: prevent creating a different user\u0027s keyrings (bnc#1065999).\n- KVM: MMU: always terminate page walks at level 1 (bsc#1062604).\n- KVM: MMU: simplify last_pte_bitmap (bsc#1062604).\n- KVM: VMX: Work around kABI breakage in \u0027enum vmx_l1d_flush_state\u0027 (bsc#1106369).\n- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).\n- KVM: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).\n- Refresh patches.xen/xen3-x86-l1tf-04-protect-PROT_NONE-ptes.patch (bsc#1105100).\n- Do not report CPU affected by L1TF when ARCH_CAP_RDCL_NO bit is set (bsc#1104906).\n- Revert \u0027- Disable patches.arch/x86-mm-Simplify-p-g4um-d_page-macros.patch\u0027 (bnc#1104818) \n- bcache: avoid unncessary cache prefetch bch_btree_node_get().\n- bcache: calculate the number of incremental GC nodes according to the total of btree nodes.\n- bcache: display rate debug parameters to 0 when writeback is not running.\n- bcache: do not check return value of debugfs_create_dir().\n- bcache: finish incremental GC.\n- bcache: fix I/O significant decline while backend devices registering.\n- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064233).\n- bcache: free heap cache_set-\u003eflush_btree in bch_journal_free.\n- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section.\n- bcache: release dc-\u003ewriteback_lock properly in bch_writeback_thread().\n- bcache: set max writeback rate when I/O request is idle (bsc#1064233).\n- bcache: simplify the calculation of the total amount of flash dirty data.\n- cifs: Fix infinite loop when using hard mount option (bsc#1091171).\n- ext4: check for allocation block validity with block group locked (bsc#1104495).\n- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).\n- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).\n- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).\n- restore cond_resched() in shrink_dcache_parent().\n- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).\n- x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104818).\n- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).\n- xen, x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104818).\n- xfs: Remove dead code from inode recover function (bsc#1105396).\n- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).\n- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).\n- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).\n- xfs: protect inode -\u003edi_dmstate with a spinlock (bsc#1024788).\n- xfs: repair malformed inode items during log recovery (bsc#1105396).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Public-Cloud-12-2018-2063,SUSE-SLE-SERVER-12-SP1-2018-2063", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2908-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2908-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182908-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2908-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1024788", "url": "https://bugzilla.suse.com/1024788" }, { "category": "self", "summary": "SUSE Bug 1062604", "url": "https://bugzilla.suse.com/1062604" }, { "category": "self", "summary": "SUSE Bug 1064233", "url": "https://bugzilla.suse.com/1064233" }, { "category": "self", "summary": "SUSE Bug 1065999", "url": "https://bugzilla.suse.com/1065999" }, { "category": "self", "summary": "SUSE Bug 1090534", "url": "https://bugzilla.suse.com/1090534" }, { "category": "self", "summary": "SUSE Bug 1090955", "url": "https://bugzilla.suse.com/1090955" }, { "category": "self", "summary": "SUSE Bug 1091171", "url": "https://bugzilla.suse.com/1091171" }, { "category": "self", "summary": "SUSE Bug 1092903", "url": "https://bugzilla.suse.com/1092903" }, { "category": "self", "summary": "SUSE Bug 1096547", "url": "https://bugzilla.suse.com/1096547" }, { "category": "self", "summary": "SUSE Bug 1097104", "url": "https://bugzilla.suse.com/1097104" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099811", "url": "https://bugzilla.suse.com/1099811" }, { "category": "self", "summary": "SUSE Bug 1099813", "url": "https://bugzilla.suse.com/1099813" }, { "category": "self", "summary": "SUSE Bug 1099844", "url": "https://bugzilla.suse.com/1099844" }, { "category": "self", "summary": "SUSE Bug 1099845", "url": "https://bugzilla.suse.com/1099845" }, { "category": "self", "summary": "SUSE Bug 1099846", "url": "https://bugzilla.suse.com/1099846" }, { "category": "self", "summary": "SUSE Bug 1099849", "url": "https://bugzilla.suse.com/1099849" }, { "category": "self", "summary": "SUSE Bug 1099863", "url": "https://bugzilla.suse.com/1099863" }, { "category": "self", "summary": "SUSE Bug 1099864", "url": "https://bugzilla.suse.com/1099864" }, { "category": "self", "summary": "SUSE Bug 1099922", "url": "https://bugzilla.suse.com/1099922" }, { "category": "self", "summary": "SUSE Bug 1100001", "url": "https://bugzilla.suse.com/1100001" }, { "category": "self", "summary": "SUSE Bug 1102870", "url": "https://bugzilla.suse.com/1102870" }, { "category": "self", "summary": "SUSE Bug 1103445", "url": "https://bugzilla.suse.com/1103445" }, { "category": "self", "summary": "SUSE Bug 1104319", "url": "https://bugzilla.suse.com/1104319" }, { "category": "self", "summary": "SUSE Bug 1104495", "url": "https://bugzilla.suse.com/1104495" }, { "category": "self", "summary": "SUSE Bug 1104818", "url": "https://bugzilla.suse.com/1104818" }, { "category": "self", "summary": "SUSE Bug 1104906", "url": "https://bugzilla.suse.com/1104906" }, { "category": "self", "summary": "SUSE Bug 1105100", "url": "https://bugzilla.suse.com/1105100" }, { "category": "self", "summary": "SUSE Bug 1105322", "url": "https://bugzilla.suse.com/1105322" }, { "category": "self", "summary": "SUSE Bug 1105323", "url": "https://bugzilla.suse.com/1105323" }, { "category": "self", "summary": "SUSE Bug 1105396", "url": "https://bugzilla.suse.com/1105396" }, { "category": "self", "summary": "SUSE Bug 1106095", "url": "https://bugzilla.suse.com/1106095" }, { "category": "self", "summary": "SUSE Bug 1106369", "url": "https://bugzilla.suse.com/1106369" }, { "category": "self", "summary": "SUSE Bug 1106509", "url": "https://bugzilla.suse.com/1106509" }, { "category": "self", "summary": "SUSE Bug 1106511", "url": "https://bugzilla.suse.com/1106511" }, { "category": "self", "summary": "SUSE Bug 1107689", "url": "https://bugzilla.suse.com/1107689" }, { "category": "self", "summary": "SUSE Bug 1108912", "url": "https://bugzilla.suse.com/1108912" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10876 page", "url": "https://www.suse.com/security/cve/CVE-2018-10876/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10877 page", "url": "https://www.suse.com/security/cve/CVE-2018-10877/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10878 page", "url": "https://www.suse.com/security/cve/CVE-2018-10878/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10879 page", "url": "https://www.suse.com/security/cve/CVE-2018-10879/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10880 page", "url": "https://www.suse.com/security/cve/CVE-2018-10880/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10881 page", "url": "https://www.suse.com/security/cve/CVE-2018-10881/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10882 page", "url": "https://www.suse.com/security/cve/CVE-2018-10882/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10883 page", "url": "https://www.suse.com/security/cve/CVE-2018-10883/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10902 page", "url": "https://www.suse.com/security/cve/CVE-2018-10902/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10940 page", "url": "https://www.suse.com/security/cve/CVE-2018-10940/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12896 page", "url": "https://www.suse.com/security/cve/CVE-2018-12896/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13093 page", "url": "https://www.suse.com/security/cve/CVE-2018-13093/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14617 page", "url": "https://www.suse.com/security/cve/CVE-2018-14617/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14634 page", "url": "https://www.suse.com/security/cve/CVE-2018-14634/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16276 page", "url": "https://www.suse.com/security/cve/CVE-2018-16276/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16658 page", "url": "https://www.suse.com/security/cve/CVE-2018-16658/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6554 page", "url": "https://www.suse.com/security/cve/CVE-2018-6554/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6555 page", "url": "https://www.suse.com/security/cve/CVE-2018-6555/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-09-27T15:01:17Z", "generator": { "date": "2018-09-27T15:01:17Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2908-1", "initial_release_date": "2018-09-27T15:01:17Z", "revision_history": [ { "date": "2018-09-27T15:01:17Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.74-60.64.104.1.noarch", "product": { "name": "kernel-devel-3.12.74-60.64.104.1.noarch", "product_id": "kernel-devel-3.12.74-60.64.104.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.74-60.64.104.1.noarch", "product": { "name": "kernel-macros-3.12.74-60.64.104.1.noarch", "product_id": "kernel-macros-3.12.74-60.64.104.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.74-60.64.104.1.noarch", "product": { "name": "kernel-source-3.12.74-60.64.104.1.noarch", "product_id": "kernel-source-3.12.74-60.64.104.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.104.1.ppc64le", "product": { "name": "kernel-default-3.12.74-60.64.104.1.ppc64le", "product_id": "kernel-default-3.12.74-60.64.104.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.104.1.ppc64le", "product": { "name": "kernel-default-base-3.12.74-60.64.104.1.ppc64le", "product_id": "kernel-default-base-3.12.74-60.64.104.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "product_id": "kernel-default-devel-3.12.74-60.64.104.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.104.1.ppc64le", "product": { "name": "kernel-syms-3.12.74-60.64.104.1.ppc64le", "product_id": "kernel-syms-3.12.74-60.64.104.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.104.1.s390x", "product": { "name": "kernel-default-3.12.74-60.64.104.1.s390x", "product_id": "kernel-default-3.12.74-60.64.104.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.104.1.s390x", "product": { "name": "kernel-default-base-3.12.74-60.64.104.1.s390x", "product_id": "kernel-default-base-3.12.74-60.64.104.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.104.1.s390x", "product": { "name": "kernel-default-devel-3.12.74-60.64.104.1.s390x", "product_id": "kernel-default-devel-3.12.74-60.64.104.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.74-60.64.104.1.s390x", "product": { "name": "kernel-default-man-3.12.74-60.64.104.1.s390x", "product_id": "kernel-default-man-3.12.74-60.64.104.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.104.1.s390x", "product": { "name": "kernel-syms-3.12.74-60.64.104.1.s390x", "product_id": "kernel-syms-3.12.74-60.64.104.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-ec2-3.12.74-60.64.104.1.x86_64", "product": { "name": "kernel-ec2-3.12.74-60.64.104.1.x86_64", "product_id": "kernel-ec2-3.12.74-60.64.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "product_id": "kernel-ec2-devel-3.12.74-60.64.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "product_id": "kernel-ec2-extra-3.12.74-60.64.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.12.74-60.64.104.1.x86_64", "product": { "name": "kernel-default-3.12.74-60.64.104.1.x86_64", "product_id": "kernel-default-3.12.74-60.64.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.104.1.x86_64", "product": { "name": "kernel-default-base-3.12.74-60.64.104.1.x86_64", "product_id": "kernel-default-base-3.12.74-60.64.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.104.1.x86_64", "product": { "name": "kernel-default-devel-3.12.74-60.64.104.1.x86_64", "product_id": "kernel-default-devel-3.12.74-60.64.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.104.1.x86_64", "product": { "name": "kernel-syms-3.12.74-60.64.104.1.x86_64", "product_id": "kernel-syms-3.12.74-60.64.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.74-60.64.104.1.x86_64", "product": { "name": "kernel-xen-3.12.74-60.64.104.1.x86_64", "product_id": "kernel-xen-3.12.74-60.64.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.74-60.64.104.1.x86_64", "product": { "name": "kernel-xen-base-3.12.74-60.64.104.1.x86_64", "product_id": "kernel-xen-base-3.12.74-60.64.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "product_id": "kernel-xen-devel-3.12.74-60.64.104.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64" }, "product_reference": "kernel-ec2-3.12.74-60.64.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.104.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le" }, "product_reference": "kernel-default-3.12.74-60.64.104.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.104.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x" }, "product_reference": "kernel-default-3.12.74-60.64.104.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.104.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.74-60.64.104.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.104.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x" }, "product_reference": "kernel-default-base-3.12.74-60.64.104.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.104.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.104.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x" }, "product_reference": "kernel-default-devel-3.12.74-60.64.104.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.74-60.64.104.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x" }, "product_reference": "kernel-default-man-3.12.74-60.64.104.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.104.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.104.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.104.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.104.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.104.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.104.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.104.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le" }, "product_reference": "kernel-syms-3.12.74-60.64.104.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.104.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x" }, "product_reference": "kernel-syms-3.12.74-60.64.104.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T15:01:17Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-10876", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10876" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10876", "url": "https://www.suse.com/security/cve/CVE-2018-10876" }, { "category": "external", "summary": "SUSE Bug 1099811 for CVE-2018-10876", "url": "https://bugzilla.suse.com/1099811" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T15:01:17Z", "details": "moderate" } ], "title": "CVE-2018-10876" }, { "cve": "CVE-2018-10877", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10877" } ], "notes": [ { "category": "general", "text": "Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10877", "url": "https://www.suse.com/security/cve/CVE-2018-10877" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10877", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099846 for CVE-2018-10877", "url": "https://bugzilla.suse.com/1099846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T15:01:17Z", "details": "moderate" } ], "title": "CVE-2018-10877" }, { "cve": "CVE-2018-10878", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10878" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10878", "url": "https://www.suse.com/security/cve/CVE-2018-10878" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10878", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099813 for CVE-2018-10878", "url": "https://bugzilla.suse.com/1099813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T15:01:17Z", "details": "moderate" } ], "title": "CVE-2018-10878" }, { "cve": "CVE-2018-10879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10879" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10879", "url": "https://www.suse.com/security/cve/CVE-2018-10879" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10879", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099844 for CVE-2018-10879", "url": "https://bugzilla.suse.com/1099844" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T15:01:17Z", "details": "moderate" } ], "title": "CVE-2018-10879" }, { "cve": "CVE-2018-10880", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10880" } ], "notes": [ { "category": "general", "text": "Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10880", "url": "https://www.suse.com/security/cve/CVE-2018-10880" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10880", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099845 for CVE-2018-10880", "url": "https://bugzilla.suse.com/1099845" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T15:01:17Z", "details": "moderate" } ], "title": "CVE-2018-10880" }, { "cve": "CVE-2018-10881", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10881" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10881", "url": "https://www.suse.com/security/cve/CVE-2018-10881" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10881", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099864 for CVE-2018-10881", "url": "https://bugzilla.suse.com/1099864" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T15:01:17Z", "details": "moderate" } ], "title": "CVE-2018-10881" }, { "cve": "CVE-2018-10882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10882" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10882", "url": "https://www.suse.com/security/cve/CVE-2018-10882" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10882", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099849 for CVE-2018-10882", "url": "https://bugzilla.suse.com/1099849" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T15:01:17Z", "details": "moderate" } ], "title": "CVE-2018-10882" }, { "cve": "CVE-2018-10883", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10883" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10883", "url": "https://www.suse.com/security/cve/CVE-2018-10883" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10883", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099863 for CVE-2018-10883", "url": "https://bugzilla.suse.com/1099863" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T15:01:17Z", "details": "moderate" } ], "title": "CVE-2018-10883" }, { "cve": "CVE-2018-10902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10902" } ], "notes": [ { "category": "general", "text": "It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10902", "url": "https://www.suse.com/security/cve/CVE-2018-10902" }, { "category": "external", "summary": "SUSE Bug 1105322 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105322" }, { "category": "external", "summary": "SUSE Bug 1105323 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T15:01:17Z", "details": "low" } ], "title": "CVE-2018-10902" }, { "cve": "CVE-2018-10940", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10940" } ], "notes": [ { "category": "general", "text": "The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c in the Linux kernel before 4.16.6 allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10940", "url": "https://www.suse.com/security/cve/CVE-2018-10940" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10940", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092903 for CVE-2018-10940", "url": "https://bugzilla.suse.com/1092903" }, { "category": "external", "summary": "SUSE Bug 1107689 for CVE-2018-10940", "url": "https://bugzilla.suse.com/1107689" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-10940", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T15:01:17Z", "details": "moderate" } ], "title": "CVE-2018-10940" }, { "cve": "CVE-2018-12896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12896" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12896", "url": "https://www.suse.com/security/cve/CVE-2018-12896" }, { "category": "external", "summary": "SUSE Bug 1099922 for CVE-2018-12896", "url": "https://bugzilla.suse.com/1099922" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T15:01:17Z", "details": "low" } ], "title": "CVE-2018-12896" }, { "cve": "CVE-2018-13093", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13093" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/xfs/xfs_icache.c in the Linux kernel through 4.17.3. There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode-\u003ei_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13093", "url": "https://www.suse.com/security/cve/CVE-2018-13093" }, { "category": "external", "summary": "SUSE Bug 1100001 for CVE-2018-13093", "url": "https://bugzilla.suse.com/1100001" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T15:01:17Z", "details": "moderate" } ], "title": "CVE-2018-13093" }, { "cve": "CVE-2018-14617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14617" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14617", "url": "https://www.suse.com/security/cve/CVE-2018-14617" }, { "category": "external", "summary": "SUSE Bug 1102870 for CVE-2018-14617", "url": "https://bugzilla.suse.com/1102870" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T15:01:17Z", "details": "moderate" } ], "title": "CVE-2018-14617" }, { "cve": "CVE-2018-14634", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14634" } ], "notes": [ { "category": "general", "text": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14634", "url": "https://www.suse.com/security/cve/CVE-2018-14634" }, { "category": "external", "summary": "SUSE Bug 1108912 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1108912" }, { "category": "external", "summary": "SUSE Bug 1108963 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1108963" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1120323 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1120323" }, { "category": "external", "summary": "SUSE Bug 1122265 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1122265" }, { "category": "external", "summary": "SUSE Bug 1188063 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1188063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T15:01:17Z", "details": "important" } ], "title": "CVE-2018-14634" }, { "cve": "CVE-2018-16276", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16276" } ], "notes": [ { "category": "general", "text": "An issue was discovered in yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7. Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16276", "url": "https://www.suse.com/security/cve/CVE-2018-16276" }, { "category": "external", "summary": "SUSE Bug 1106095 for CVE-2018-16276", "url": "https://bugzilla.suse.com/1106095" }, { "category": "external", "summary": "SUSE Bug 1115593 for CVE-2018-16276", "url": "https://bugzilla.suse.com/1115593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T15:01:17Z", "details": "important" } ], "title": "CVE-2018-16276" }, { "cve": "CVE-2018-16658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16658" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16658", "url": "https://www.suse.com/security/cve/CVE-2018-16658" }, { "category": "external", "summary": "SUSE Bug 1092903 for CVE-2018-16658", "url": "https://bugzilla.suse.com/1092903" }, { "category": "external", "summary": "SUSE Bug 1107689 for CVE-2018-16658", "url": "https://bugzilla.suse.com/1107689" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-16658", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T15:01:17Z", "details": "low" } ], "title": "CVE-2018-16658" }, { "cve": "CVE-2018-6554", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6554" } ], "notes": [ { "category": "general", "text": "Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6554", "url": "https://www.suse.com/security/cve/CVE-2018-6554" }, { "category": "external", "summary": "SUSE Bug 1106509 for CVE-2018-6554", "url": "https://bugzilla.suse.com/1106509" }, { "category": "external", "summary": "SUSE Bug 1106511 for CVE-2018-6554", "url": "https://bugzilla.suse.com/1106511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T15:01:17Z", "details": "low" } ], "title": "CVE-2018-6554" }, { "cve": "CVE-2018-6555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6555" } ], "notes": [ { "category": "general", "text": "The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6555", "url": "https://www.suse.com/security/cve/CVE-2018-6555" }, { "category": "external", "summary": "SUSE Bug 1106509 for CVE-2018-6555", "url": "https://bugzilla.suse.com/1106509" }, { "category": "external", "summary": "SUSE Bug 1106511 for CVE-2018-6555", "url": "https://bugzilla.suse.com/1106511" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-6555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-27T15:01:17Z", "details": "moderate" } ], "title": "CVE-2018-6555" } ] }
suse-su-2018:3171-1
Vulnerability from csaf_suse
Published
2018-10-16 16:31
Modified
2018-10-16 16:31
Summary
Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_99 fixes several issues.
The following security issues were fixed:
- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14634: An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable (bsc#1108963).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
Patchnames
SUSE-SLE-SERVER-12-SP1-2018-2266,SUSE-SLE-SERVER-12-SP1-2018-2267,SUSE-SLE-SERVER-12-SP1-2018-2268,SUSE-SLE-SERVER-12-SP1-2018-2269,SUSE-SLE-SERVER-12-SP1-2018-2270,SUSE-SLE-SERVER-12-SP1-2018-2271,SUSE-SLE-SERVER-12-SP1-2018-2272,SUSE-SLE-SERVER-12-SP1-2018-2273,SUSE-SLE-SERVER-12-SP1-2018-2275
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_99 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).\n- CVE-2018-14634: An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable (bsc#1108963).\n- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target\u0027s code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-SP1-2018-2266,SUSE-SLE-SERVER-12-SP1-2018-2267,SUSE-SLE-SERVER-12-SP1-2018-2268,SUSE-SLE-SERVER-12-SP1-2018-2269,SUSE-SLE-SERVER-12-SP1-2018-2270,SUSE-SLE-SERVER-12-SP1-2018-2271,SUSE-SLE-SERVER-12-SP1-2018-2272,SUSE-SLE-SERVER-12-SP1-2018-2273,SUSE-SLE-SERVER-12-SP1-2018-2275", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3171-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:3171-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183171-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:3171-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004679.html" }, { "category": "self", "summary": "SUSE Bug 1107832", "url": "https://bugzilla.suse.com/1107832" }, { "category": "self", "summary": "SUSE Bug 1108963", "url": "https://bugzilla.suse.com/1108963" }, { "category": "self", "summary": "SUSE Bug 1110233", "url": "https://bugzilla.suse.com/1110233" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14633 page", "url": "https://www.suse.com/security/cve/CVE-2018-14633/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14634 page", "url": "https://www.suse.com/security/cve/CVE-2018-14634/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17182 page", "url": "https://www.suse.com/security/cve/CVE-2018-17182/" } ], "title": "Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-10-16T16:31:33Z", "generator": { "date": "2018-10-16T16:31:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:3171-1", "initial_release_date": "2018-10-16T16:31:33Z", "revision_history": [ { "date": "2018-10-16T16:31:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-14633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14633" } ], "notes": [ { "category": "general", "text": "A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target\u0027s code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14633", "url": "https://www.suse.com/security/cve/CVE-2018-14633" }, { "category": "external", "summary": "SUSE Bug 1107829 for CVE-2018-14633", "url": "https://bugzilla.suse.com/1107829" }, { "category": "external", "summary": "SUSE Bug 1107832 for CVE-2018-14633", "url": "https://bugzilla.suse.com/1107832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-16T16:31:33Z", "details": "moderate" } ], "title": "CVE-2018-14633" }, { "cve": "CVE-2018-14634", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14634" } ], "notes": [ { "category": "general", "text": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14634", "url": "https://www.suse.com/security/cve/CVE-2018-14634" }, { "category": "external", "summary": "SUSE Bug 1108912 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1108912" }, { "category": "external", "summary": "SUSE Bug 1108963 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1108963" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1120323 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1120323" }, { "category": "external", "summary": "SUSE Bug 1122265 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1122265" }, { "category": "external", "summary": "SUSE Bug 1188063 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1188063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-16T16:31:33Z", "details": "important" } ], "title": "CVE-2018-14634" }, { "cve": "CVE-2018-17182", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-17182" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-17182", "url": "https://www.suse.com/security/cve/CVE-2018-17182" }, { "category": "external", "summary": "SUSE Bug 1108399 for CVE-2018-17182", "url": "https://bugzilla.suse.com/1108399" }, { "category": "external", "summary": "SUSE Bug 1110233 for CVE-2018-17182", "url": "https://bugzilla.suse.com/1110233" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-16T16:31:33Z", "details": "moderate" } ], "title": "CVE-2018-17182" } ] }
suse-su-2018:2879-1
Vulnerability from csaf_suse
Published
2018-09-26 12:53
Modified
2018-09-26 12:53
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-14617: Prevent NULL pointer dereference and panic in
hfsplus_lookup() when opening a file (that is purportedly a hard link) in an
hfs+ filesystem that has malformed catalog data, and is mounted read-only
without a metadata directory (bsc#1102870).
- CVE-2018-16276: Incorrect bounds checking in the yurex USB driver in
yurex_read allowed local attackers to use user access read/writes to crash the
kernel or potentially escalate privileges (bsc#1106095).
- CVE-2018-15594: Ensure correct handling of indirect calls, to prevent
attackers for conducting Spectre-v2 attacks against paravirtual guests
(bsc#1105348).
- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a
local attacker to exploit this vulnerability via a SUID-root binary and obtain
full root privileges (bsc#1108912)
- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was
caused by the way the overrun accounting works. Depending on interval and
expiry time values, the overrun can be larger than INT_MAX, but the accounting
is int based. This basically made the accounting values, which are visible to
user space via timer_getoverrun(2) and siginfo::si_overrun, random. This
allowed a local user to cause a denial of service (signed integer overflow) via
crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922)
- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local
attackers to use a incorrect bounds check in the CDROM driver
CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that
could have been used by local attackers to read kernel memory (bnc#1107689)
- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a
denial of service (ias_object use-after-free and system crash) or possibly have
unspecified other impact via an AF_IRDA socket (bnc#1106511)
- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed
local users to cause a denial of service (memory consumption) by repeatedly
binding an AF_IRDA socket (bnc#1106509)
- CVE-2018-15572: The spectre_v2_select_mitigation function did not always fill
RSB upon a context switch, which made it easier for attackers to conduct
userspace-userspace spectreRSB attacks (bnc#1102517)
- CVE-2018-10902: Protect against concurrent access to prevent double realloc
(double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A
malicious local attacker could have used this for privilege escalation
(bnc#1105322)
- CVE-2018-14734: ucma_leave_multicast accessed a certain data structure after
a cleanup step in ucma_process_join, which allowed attackers to cause a denial
of service (use-after-free) (bsc#1103119)
The following non-security bugs were fixed:
- ACPI: APEI / ERST: Fix missing error handling in erst_reader() (bsc#1045538).
- ALSA: fm801: propagate TUNER_ONLY bit when autodetected (bsc#1045538).
- ALSA: pcm: Fix snd_pcm_hw_params struct copy in compat mode (bsc#1045538).
- ALSA: pcm: Use dma_bytes as size parameter in dma_mmap_coherent() (bsc#1045538).
- ALSA: pcm: fix fifo_size frame calculation (bsc#1045538).
- ALSA: snd-aoa: add of_node_put() in error path (bsc#1045538).
- ALSA: usb-audio: Add sanity checks in v2 clock parsers (bsc#1045538).
- ALSA: usb-audio: Add sanity checks to FE parser (bsc#1045538).
- ALSA: usb-audio: Fix UAC2 get_ctl request with a RANGE attribute (bsc#1045538).
- ALSA: usb-audio: Fix bogus error return in snd_usb_create_stream() (bsc#1045538).
- ALSA: usb-audio: Fix parameter block size for UAC2 control requests (bsc#1045538).
- ALSA: usb-audio: Fix parsing descriptor of UAC2 processing unit (bsc#1045538).
- ALSA: usb-audio: Fix potential out-of-bound access at parsing SU (bsc#1045538).
- ALSA: usb-audio: Set correct type for some UAC2 mixer controls (bsc#1045538).
- ASoC: blackfin: Fix missing break (bsc#1045538).
- Enforce module signatures if the kernel is locked down (bsc#1093666).
- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- PCI: Fix TI816X class code quirk (bsc#1050431).
- Refresh patches.xen/xen3-x86-l1tf-04-protect-PROT_NONE-ptes.patch (bsc#1105100).
- TPM: Zero buffer whole after copying to userspace (bsc#1050381).
- USB: add USB_DEVICE_INTERFACE_CLASS macro (bsc#1047487).
- USB: hub: fix non-SS hub-descriptor handling (bsc#1047487).
- USB: serial: ftdi_sio: fix latency-timer error handling (bsc#1037441).
- USB: serial: io_edgeport: fix possible sleep-in-atomic (bsc#1037441).
- USB: serial: io_ti: fix NULL-deref in interrupt callback (bsc#1106609).
- USB: serial: sierra: fix potential deadlock at close (bsc#1100132).
- USB: visor: Match I330 phone more precisely (bsc#1047487).
- applicom: dereferencing NULL on error path (git-fixes).
- ath5k: Change led pin configuration for compaq c700 laptop (bsc#1048185).
- base: make module_create_drivers_dir race-free (git-fixes).
- block: fix an error code in add_partition() (bsc#1106209).
- btrfs: scrub: Do not use inode page cache in scrub_handle_errored_block() (bsc#1108096).
- btrfs: scrub: Do not use inode pages for device replace (bsc#1107949).
- dasd: Add IFCC notice message (bnc#1104481, LTC#170484).
- drm/i915: Remove bogus __init annotation from DMI callbacks (bsc#1106886).
- drm/i915: fix use-after-free in page_flip_completed() (bsc#1103909).
- drm/nouveau/gem: off by one bugs in nouveau_gem_pushbuf_reloc_apply() (bsc#1106886).
- drm/vmwgfx: Handle vmalloc() failure in vmw_local_fifo_reserve() (bsc#1106886).
- drm: crtc: integer overflow in drm_property_create_blob() (bsc#1106886).
- drm: re-enable error handling (bsc#1103884)
- fbdev: omapfb: off by one in omapfb_register_client() (bsc#1106886).
- iommu/amd: Finish TLB flush in amd_iommu_unmap() (bsc#1106105).
- iommu/amd: Fix the left value check of cmd buffer (bsc#1106105).
- iommu/amd: Free domain id when free a domain of struct dma_ops_domain (bsc#1106105).
- iommu/amd: Update Alias-DTE in update_device_table() (bsc#1106105).
- iommu/vt-d: Do not over-free page table directories (bsc#1106105).
- iommu/vt-d: Ratelimit each dmar fault printing (bsc#1106105).
- ipv6: Regenerate host route according to node pointer upon loopback up (bsc#1100705).
- ipv6: correctly add local routes when lo goes up (bsc#1100705).
- ipv6: introduce ip6_rt_put() (bsc#1100705).
- ipv6: reallocate addrconf router for ipv6 address when lo device up (bsc#1100705).
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- kthread, tracing: Do not expose half-written comm when creating kthreads (Git-fixes).
- mm/hugetlb: add migration/hwpoisoned entry check in hugetlb_change_protection (bnc#1107071).
- mm/mempolicy.c: avoid use uninitialized preferred_node (bnc#1107064).
- modsign: log module name in the event of an error (bsc#1093666).
- modsign: print module name along with error message (bsc#1093666).
- module: make it clear when we're handling the module copy in info->hdr (bsc#1093666).
- module: setup load info before module_sig_check() (bsc#1093666).
- nbd: ratelimit error msgs after socket close (bsc#1106206).
- ncpfs: return proper error from NCP_IOC_SETROOT ioctl (bsc#1106199).
- nvme: add device id's with intel stripe quirk (bsc#1097562).
- perf/core: Fix group scheduling with mixed hw and sw events (Git-fixes).
- perf/x86/intel: Add cpu_(prepare|starting|dying) for core_pmu (bsc#1104901).
- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032, git-fixes).
- powerpc/fadump: Do not use hugepages when fadump is active (bsc#1092772, bsc#1107650).
- powerpc/fadump: exclude memory holes while reserving memory in second kernel (bsc#1092772, bsc#1107650).
- powerpc/fadump: re-register firmware-assisted dump if already registered (bsc#1108170, bsc#1108823).
- powerpc/lib: Fix off-by-one in alternate feature patching (bsc#1064861).
- powerpc/lib: Fix the feature fixup tests to actually work (bsc#1064861).
- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157, git-fixes).
- powerpc: Avoid code patching freed init sections (bnc#1107735).
- powerpc: make feature-fixup tests fortify-safe (bsc#1064861).
- ptrace: fix PTRACE_LISTEN race corrupting task->state (bnc#1107001).
- qlge: Fix netdev features configuration (bsc#1098822).
- resource: fix integer overflow at reallocation (bsc#1045538).
- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources (bsc#1057199)
- s390/ftrace: use expoline for indirect branches (bnc#1106930, LTC#171029).
- s390/kernel: use expoline for indirect branches (bnc#1106930, LTC#171029).
- s390/qeth: do not clobber buffer on async TX completion (bnc#1060245, LTC#170349).
- s390: Correct register corruption in critical section cleanup (bnc#1106930, LTC#171029).
- s390: add assembler macros for CPU alternatives (bnc#1106930, LTC#171029).
- s390: detect etoken facility (bnc#1106930, LTC#171029).
- s390: move expoline assembler macros to a header (bnc#1106930, LTC#171029).
- s390: move spectre sysfs attribute code (bnc#1106930, LTC#171029).
- s390: remove indirect branch from do_softirq_own_stack (bnc#1106930, LTC#171029).
- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).
- sys: do not hold uts_sem while accessing userspace memory (bnc#1106995).
- tpm: fix race condition in tpm_common_write() (bsc#1050381).
- tracing/blktrace: Fix to allow setting same value (bsc#1106212).
- tty: vt, fix bogus division in csi_J (git-fixes).
- tty: vt, return error when con_startup fails (git-fixes).
- uml: fix hostfs mknod() (bsc#1106202).
- usb: audio-v2: Correct the comment for struct uac_clock_selector_descriptor (bsc#1045538).
- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).
- x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
- x86/init: fix build with CONFIG_SWAP=n (bsc#1105723).
- x86/mm: Prevent kernel Oops in PTDUMP code with HIGHPTE=y (bsc#1106105).
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).
- x86/vdso: Fix vDSO build if a retpoline is emitted (git-fixes).
- xen x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- xen x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- xen, x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- xen: x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
Patchnames
sdksp4-kernel-13796,slessp4-kernel-13796,slexsp3-kernel-13796
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-14617: Prevent NULL pointer dereference and panic in\n hfsplus_lookup() when opening a file (that is purportedly a hard link) in an\n hfs+ filesystem that has malformed catalog data, and is mounted read-only\n without a metadata directory (bsc#1102870).\n- CVE-2018-16276: Incorrect bounds checking in the yurex USB driver in\n yurex_read allowed local attackers to use user access read/writes to crash the\n kernel or potentially escalate privileges (bsc#1106095).\n- CVE-2018-15594: Ensure correct handling of indirect calls, to prevent\n attackers for conducting Spectre-v2 attacks against paravirtual guests\n (bsc#1105348).\n- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a\n local attacker to exploit this vulnerability via a SUID-root binary and obtain\n full root privileges (bsc#1108912)\n- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was\n caused by the way the overrun accounting works. Depending on interval and\n expiry time values, the overrun can be larger than INT_MAX, but the accounting\n is int based. This basically made the accounting values, which are visible to\n user space via timer_getoverrun(2) and siginfo::si_overrun, random. This\n allowed a local user to cause a denial of service (signed integer overflow) via\n crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922)\n- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local\n attackers to use a incorrect bounds check in the CDROM driver\n CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)\n- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that\n could have been used by local attackers to read kernel memory (bnc#1107689)\n- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a\n denial of service (ias_object use-after-free and system crash) or possibly have\n unspecified other impact via an AF_IRDA socket (bnc#1106511)\n- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed\n local users to cause a denial of service (memory consumption) by repeatedly\n binding an AF_IRDA socket (bnc#1106509)\n- CVE-2018-15572: The spectre_v2_select_mitigation function did not always fill\n RSB upon a context switch, which made it easier for attackers to conduct\n userspace-userspace spectreRSB attacks (bnc#1102517)\n- CVE-2018-10902: Protect against concurrent access to prevent double realloc\n (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A\n malicious local attacker could have used this for privilege escalation\n (bnc#1105322)\n- CVE-2018-14734: ucma_leave_multicast accessed a certain data structure after\n a cleanup step in ucma_process_join, which allowed attackers to cause a denial\n of service (use-after-free) (bsc#1103119)\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI / ERST: Fix missing error handling in erst_reader() (bsc#1045538).\n- ALSA: fm801: propagate TUNER_ONLY bit when autodetected (bsc#1045538).\n- ALSA: pcm: Fix snd_pcm_hw_params struct copy in compat mode (bsc#1045538).\n- ALSA: pcm: Use dma_bytes as size parameter in dma_mmap_coherent() (bsc#1045538).\n- ALSA: pcm: fix fifo_size frame calculation (bsc#1045538).\n- ALSA: snd-aoa: add of_node_put() in error path (bsc#1045538).\n- ALSA: usb-audio: Add sanity checks in v2 clock parsers (bsc#1045538).\n- ALSA: usb-audio: Add sanity checks to FE parser (bsc#1045538).\n- ALSA: usb-audio: Fix UAC2 get_ctl request with a RANGE attribute (bsc#1045538).\n- ALSA: usb-audio: Fix bogus error return in snd_usb_create_stream() (bsc#1045538).\n- ALSA: usb-audio: Fix parameter block size for UAC2 control requests (bsc#1045538).\n- ALSA: usb-audio: Fix parsing descriptor of UAC2 processing unit (bsc#1045538).\n- ALSA: usb-audio: Fix potential out-of-bound access at parsing SU (bsc#1045538).\n- ALSA: usb-audio: Set correct type for some UAC2 mixer controls (bsc#1045538).\n- ASoC: blackfin: Fix missing break (bsc#1045538).\n- Enforce module signatures if the kernel is locked down (bsc#1093666).\n- KVM: VMX: Work around kABI breakage in \u0027enum vmx_l1d_flush_state\u0027 (bsc#1106369).\n- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).\n- PCI: Fix TI816X class code quirk (bsc#1050431).\n- Refresh patches.xen/xen3-x86-l1tf-04-protect-PROT_NONE-ptes.patch (bsc#1105100).\n- TPM: Zero buffer whole after copying to userspace (bsc#1050381).\n- USB: add USB_DEVICE_INTERFACE_CLASS macro (bsc#1047487).\n- USB: hub: fix non-SS hub-descriptor handling (bsc#1047487).\n- USB: serial: ftdi_sio: fix latency-timer error handling (bsc#1037441).\n- USB: serial: io_edgeport: fix possible sleep-in-atomic (bsc#1037441).\n- USB: serial: io_ti: fix NULL-deref in interrupt callback (bsc#1106609).\n- USB: serial: sierra: fix potential deadlock at close (bsc#1100132).\n- USB: visor: Match I330 phone more precisely (bsc#1047487).\n- applicom: dereferencing NULL on error path (git-fixes).\n- ath5k: Change led pin configuration for compaq c700 laptop (bsc#1048185).\n- base: make module_create_drivers_dir race-free (git-fixes).\n- block: fix an error code in add_partition() (bsc#1106209).\n- btrfs: scrub: Do not use inode page cache in scrub_handle_errored_block() (bsc#1108096).\n- btrfs: scrub: Do not use inode pages for device replace (bsc#1107949).\n- dasd: Add IFCC notice message (bnc#1104481, LTC#170484).\n- drm/i915: Remove bogus __init annotation from DMI callbacks (bsc#1106886).\n- drm/i915: fix use-after-free in page_flip_completed() (bsc#1103909).\n- drm/nouveau/gem: off by one bugs in nouveau_gem_pushbuf_reloc_apply() (bsc#1106886).\n- drm/vmwgfx: Handle vmalloc() failure in vmw_local_fifo_reserve() (bsc#1106886).\n- drm: crtc: integer overflow in drm_property_create_blob() (bsc#1106886).\n- drm: re-enable error handling (bsc#1103884)\n- fbdev: omapfb: off by one in omapfb_register_client() (bsc#1106886).\n- iommu/amd: Finish TLB flush in amd_iommu_unmap() (bsc#1106105).\n- iommu/amd: Fix the left value check of cmd buffer (bsc#1106105).\n- iommu/amd: Free domain id when free a domain of struct dma_ops_domain (bsc#1106105).\n- iommu/amd: Update Alias-DTE in update_device_table() (bsc#1106105).\n- iommu/vt-d: Do not over-free page table directories (bsc#1106105).\n- iommu/vt-d: Ratelimit each dmar fault printing (bsc#1106105).\n- ipv6: Regenerate host route according to node pointer upon loopback up (bsc#1100705).\n- ipv6: correctly add local routes when lo goes up (bsc#1100705).\n- ipv6: introduce ip6_rt_put() (bsc#1100705).\n- ipv6: reallocate addrconf router for ipv6 address when lo device up (bsc#1100705).\n- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).\n- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).\n- kthread, tracing: Do not expose half-written comm when creating kthreads (Git-fixes).\n- mm/hugetlb: add migration/hwpoisoned entry check in hugetlb_change_protection (bnc#1107071).\n- mm/mempolicy.c: avoid use uninitialized preferred_node (bnc#1107064).\n- modsign: log module name in the event of an error (bsc#1093666).\n- modsign: print module name along with error message (bsc#1093666).\n- module: make it clear when we\u0027re handling the module copy in info-\u003ehdr (bsc#1093666).\n- module: setup load info before module_sig_check() (bsc#1093666).\n- nbd: ratelimit error msgs after socket close (bsc#1106206).\n- ncpfs: return proper error from NCP_IOC_SETROOT ioctl (bsc#1106199).\n- nvme: add device id\u0027s with intel stripe quirk (bsc#1097562).\n- perf/core: Fix group scheduling with mixed hw and sw events (Git-fixes).\n- perf/x86/intel: Add cpu_(prepare|starting|dying) for core_pmu (bsc#1104901).\n- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032, git-fixes).\n- powerpc/fadump: Do not use hugepages when fadump is active (bsc#1092772, bsc#1107650).\n- powerpc/fadump: exclude memory holes while reserving memory in second kernel (bsc#1092772, bsc#1107650).\n- powerpc/fadump: re-register firmware-assisted dump if already registered (bsc#1108170, bsc#1108823).\n- powerpc/lib: Fix off-by-one in alternate feature patching (bsc#1064861).\n- powerpc/lib: Fix the feature fixup tests to actually work (bsc#1064861).\n- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157, git-fixes).\n- powerpc: Avoid code patching freed init sections (bnc#1107735).\n- powerpc: make feature-fixup tests fortify-safe (bsc#1064861).\n- ptrace: fix PTRACE_LISTEN race corrupting task-\u003estate (bnc#1107001).\n- qlge: Fix netdev features configuration (bsc#1098822).\n- resource: fix integer overflow at reallocation (bsc#1045538).\n- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources (bsc#1057199)\n- s390/ftrace: use expoline for indirect branches (bnc#1106930, LTC#171029).\n- s390/kernel: use expoline for indirect branches (bnc#1106930, LTC#171029).\n- s390/qeth: do not clobber buffer on async TX completion (bnc#1060245, LTC#170349).\n- s390: Correct register corruption in critical section cleanup (bnc#1106930, LTC#171029).\n- s390: add assembler macros for CPU alternatives (bnc#1106930, LTC#171029).\n- s390: detect etoken facility (bnc#1106930, LTC#171029).\n- s390: move expoline assembler macros to a header (bnc#1106930, LTC#171029).\n- s390: move spectre sysfs attribute code (bnc#1106930, LTC#171029).\n- s390: remove indirect branch from do_softirq_own_stack (bnc#1106930, LTC#171029).\n- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).\n- sys: do not hold uts_sem while accessing userspace memory (bnc#1106995).\n- tpm: fix race condition in tpm_common_write() (bsc#1050381).\n- tracing/blktrace: Fix to allow setting same value (bsc#1106212).\n- tty: vt, fix bogus division in csi_J (git-fixes).\n- tty: vt, return error when con_startup fails (git-fixes).\n- uml: fix hostfs mknod() (bsc#1106202).\n- usb: audio-v2: Correct the comment for struct uac_clock_selector_descriptor (bsc#1045538).\n- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).\n- x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).\n- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).\n- x86/init: fix build with CONFIG_SWAP=n (bsc#1105723).\n- x86/mm: Prevent kernel Oops in PTDUMP code with HIGHPTE=y (bsc#1106105).\n- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).\n- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).\n- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).\n- x86/vdso: Fix vDSO build if a retpoline is emitted (git-fixes).\n- xen x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).\n- xen x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).\n- xen, x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).\n- xen: x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-kernel-13796,slessp4-kernel-13796,slexsp3-kernel-13796", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2879-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2879-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182879-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2879-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" }, { "category": "self", "summary": "SUSE Bug 1037441", "url": "https://bugzilla.suse.com/1037441" }, { "category": "self", "summary": "SUSE Bug 1045538", "url": "https://bugzilla.suse.com/1045538" }, { "category": "self", "summary": "SUSE Bug 1047487", "url": "https://bugzilla.suse.com/1047487" }, { "category": "self", "summary": "SUSE Bug 1048185", "url": "https://bugzilla.suse.com/1048185" }, { "category": "self", "summary": "SUSE Bug 1050381", "url": "https://bugzilla.suse.com/1050381" }, { "category": "self", "summary": "SUSE Bug 1050431", "url": "https://bugzilla.suse.com/1050431" }, { "category": "self", "summary": "SUSE Bug 1057199", "url": "https://bugzilla.suse.com/1057199" }, { "category": "self", "summary": "SUSE Bug 1060245", "url": "https://bugzilla.suse.com/1060245" }, { "category": "self", "summary": "SUSE Bug 1064861", "url": "https://bugzilla.suse.com/1064861" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1080157", "url": "https://bugzilla.suse.com/1080157" }, { "category": "self", "summary": "SUSE Bug 1087081", "url": "https://bugzilla.suse.com/1087081" }, { "category": "self", "summary": "SUSE Bug 1092772", "url": "https://bugzilla.suse.com/1092772" }, { "category": "self", "summary": "SUSE Bug 1092903", "url": "https://bugzilla.suse.com/1092903" }, { "category": "self", "summary": "SUSE Bug 1093666", "url": "https://bugzilla.suse.com/1093666" }, { "category": "self", "summary": "SUSE Bug 1096547", "url": "https://bugzilla.suse.com/1096547" }, { "category": "self", "summary": "SUSE Bug 1097562", "url": "https://bugzilla.suse.com/1097562" }, { "category": "self", "summary": "SUSE Bug 1098822", "url": "https://bugzilla.suse.com/1098822" }, { "category": "self", "summary": "SUSE Bug 1099922", "url": "https://bugzilla.suse.com/1099922" }, { "category": "self", "summary": "SUSE Bug 1100132", "url": "https://bugzilla.suse.com/1100132" }, { "category": "self", "summary": "SUSE Bug 1100705", "url": "https://bugzilla.suse.com/1100705" }, { "category": "self", "summary": "SUSE Bug 1102517", "url": "https://bugzilla.suse.com/1102517" }, { "category": "self", "summary": "SUSE Bug 1102870", "url": "https://bugzilla.suse.com/1102870" }, { "category": "self", "summary": "SUSE Bug 1103119", "url": "https://bugzilla.suse.com/1103119" }, { "category": "self", "summary": "SUSE Bug 1103884", "url": "https://bugzilla.suse.com/1103884" }, { "category": "self", "summary": "SUSE Bug 1103909", "url": "https://bugzilla.suse.com/1103909" }, { "category": "self", "summary": "SUSE Bug 1104481", "url": "https://bugzilla.suse.com/1104481" }, { "category": "self", "summary": "SUSE Bug 1104684", "url": "https://bugzilla.suse.com/1104684" }, { "category": "self", "summary": "SUSE Bug 1104818", "url": "https://bugzilla.suse.com/1104818" }, { "category": "self", "summary": "SUSE Bug 1104901", "url": "https://bugzilla.suse.com/1104901" }, { "category": "self", "summary": "SUSE Bug 1105100", "url": "https://bugzilla.suse.com/1105100" }, { "category": "self", "summary": "SUSE Bug 1105322", "url": "https://bugzilla.suse.com/1105322" }, { "category": "self", "summary": "SUSE Bug 1105348", "url": "https://bugzilla.suse.com/1105348" }, { "category": "self", "summary": "SUSE Bug 1105536", "url": "https://bugzilla.suse.com/1105536" }, { "category": "self", "summary": "SUSE Bug 1105723", "url": "https://bugzilla.suse.com/1105723" }, { "category": "self", "summary": "SUSE Bug 1106095", "url": "https://bugzilla.suse.com/1106095" }, { "category": "self", "summary": "SUSE Bug 1106105", "url": "https://bugzilla.suse.com/1106105" }, { "category": "self", "summary": "SUSE Bug 1106199", "url": "https://bugzilla.suse.com/1106199" }, { "category": "self", "summary": "SUSE Bug 1106202", "url": "https://bugzilla.suse.com/1106202" }, { "category": "self", "summary": "SUSE Bug 1106206", "url": "https://bugzilla.suse.com/1106206" }, { "category": "self", "summary": "SUSE Bug 1106209", "url": "https://bugzilla.suse.com/1106209" }, { "category": "self", "summary": "SUSE Bug 1106212", "url": "https://bugzilla.suse.com/1106212" }, { "category": "self", "summary": "SUSE Bug 1106369", "url": "https://bugzilla.suse.com/1106369" }, { "category": "self", "summary": "SUSE Bug 1106509", "url": "https://bugzilla.suse.com/1106509" }, { "category": "self", "summary": "SUSE Bug 1106511", "url": "https://bugzilla.suse.com/1106511" }, { "category": "self", "summary": "SUSE Bug 1106609", "url": "https://bugzilla.suse.com/1106609" }, { "category": "self", "summary": "SUSE Bug 1106886", "url": "https://bugzilla.suse.com/1106886" }, { "category": "self", "summary": "SUSE Bug 1106930", "url": "https://bugzilla.suse.com/1106930" }, { "category": "self", "summary": "SUSE Bug 1106995", "url": "https://bugzilla.suse.com/1106995" }, { "category": "self", "summary": "SUSE Bug 1107001", "url": "https://bugzilla.suse.com/1107001" }, { "category": "self", "summary": "SUSE Bug 1107064", "url": "https://bugzilla.suse.com/1107064" }, { "category": "self", "summary": "SUSE Bug 1107071", "url": "https://bugzilla.suse.com/1107071" }, { "category": "self", "summary": "SUSE Bug 1107650", "url": "https://bugzilla.suse.com/1107650" }, { "category": "self", "summary": "SUSE Bug 1107689", "url": "https://bugzilla.suse.com/1107689" }, { "category": "self", "summary": "SUSE Bug 1107735", "url": "https://bugzilla.suse.com/1107735" }, { "category": "self", "summary": "SUSE Bug 1107949", "url": "https://bugzilla.suse.com/1107949" }, { "category": "self", "summary": "SUSE Bug 1108096", "url": "https://bugzilla.suse.com/1108096" }, { "category": "self", "summary": "SUSE Bug 1108170", "url": "https://bugzilla.suse.com/1108170" }, { "category": "self", "summary": "SUSE Bug 1108823", "url": "https://bugzilla.suse.com/1108823" }, { "category": "self", "summary": "SUSE Bug 1108912", "url": "https://bugzilla.suse.com/1108912" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10902 page", "url": "https://www.suse.com/security/cve/CVE-2018-10902/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10940 page", "url": "https://www.suse.com/security/cve/CVE-2018-10940/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12896 page", "url": "https://www.suse.com/security/cve/CVE-2018-12896/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14617 page", "url": "https://www.suse.com/security/cve/CVE-2018-14617/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14634 page", "url": "https://www.suse.com/security/cve/CVE-2018-14634/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14734 page", "url": "https://www.suse.com/security/cve/CVE-2018-14734/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15572 page", "url": "https://www.suse.com/security/cve/CVE-2018-15572/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15594 page", "url": "https://www.suse.com/security/cve/CVE-2018-15594/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16276 page", "url": "https://www.suse.com/security/cve/CVE-2018-16276/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16658 page", "url": "https://www.suse.com/security/cve/CVE-2018-16658/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6554 page", "url": "https://www.suse.com/security/cve/CVE-2018-6554/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6555 page", "url": "https://www.suse.com/security/cve/CVE-2018-6555/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-09-26T12:53:30Z", "generator": { "date": "2018-09-26T12:53:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2879-1", "initial_release_date": "2018-09-26T12:53:30Z", "revision_history": [ { "date": "2018-09-26T12:53:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.71.1.i586", "product": { "name": "kernel-default-3.0.101-108.71.1.i586", "product_id": "kernel-default-3.0.101-108.71.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.71.1.i586", "product": { "name": "kernel-default-base-3.0.101-108.71.1.i586", "product_id": "kernel-default-base-3.0.101-108.71.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.71.1.i586", "product": { "name": "kernel-default-devel-3.0.101-108.71.1.i586", "product_id": "kernel-default-devel-3.0.101-108.71.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.71.1.i586", "product": { "name": "kernel-ec2-3.0.101-108.71.1.i586", "product_id": "kernel-ec2-3.0.101-108.71.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.71.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-108.71.1.i586", "product_id": "kernel-ec2-base-3.0.101-108.71.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.71.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-108.71.1.i586", "product_id": "kernel-ec2-devel-3.0.101-108.71.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-108.71.1.i586", "product": { "name": "kernel-pae-3.0.101-108.71.1.i586", "product_id": "kernel-pae-3.0.101-108.71.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-108.71.1.i586", "product": { "name": "kernel-pae-base-3.0.101-108.71.1.i586", "product_id": "kernel-pae-base-3.0.101-108.71.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-108.71.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-108.71.1.i586", "product_id": "kernel-pae-devel-3.0.101-108.71.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.71.1.i586", "product": { "name": "kernel-source-3.0.101-108.71.1.i586", "product_id": "kernel-source-3.0.101-108.71.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.71.1.i586", "product": { "name": "kernel-syms-3.0.101-108.71.1.i586", "product_id": "kernel-syms-3.0.101-108.71.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.71.1.i586", "product": { "name": "kernel-trace-3.0.101-108.71.1.i586", "product_id": "kernel-trace-3.0.101-108.71.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.71.1.i586", "product": { "name": "kernel-trace-base-3.0.101-108.71.1.i586", "product_id": "kernel-trace-base-3.0.101-108.71.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.71.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-108.71.1.i586", "product_id": "kernel-trace-devel-3.0.101-108.71.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.71.1.i586", "product": { "name": "kernel-xen-3.0.101-108.71.1.i586", "product_id": "kernel-xen-3.0.101-108.71.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.71.1.i586", "product": { "name": "kernel-xen-base-3.0.101-108.71.1.i586", "product_id": "kernel-xen-base-3.0.101-108.71.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.71.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-108.71.1.i586", "product_id": "kernel-xen-devel-3.0.101-108.71.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.71.1.ia64", "product": { "name": "kernel-default-3.0.101-108.71.1.ia64", "product_id": "kernel-default-3.0.101-108.71.1.ia64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.71.1.ia64", "product": { "name": "kernel-default-base-3.0.101-108.71.1.ia64", "product_id": "kernel-default-base-3.0.101-108.71.1.ia64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.71.1.ia64", "product": { "name": "kernel-default-devel-3.0.101-108.71.1.ia64", "product_id": "kernel-default-devel-3.0.101-108.71.1.ia64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.71.1.ia64", "product": { "name": "kernel-source-3.0.101-108.71.1.ia64", "product_id": "kernel-source-3.0.101-108.71.1.ia64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.71.1.ia64", "product": { "name": "kernel-syms-3.0.101-108.71.1.ia64", "product_id": "kernel-syms-3.0.101-108.71.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.71.1.ia64", "product": { "name": "kernel-trace-3.0.101-108.71.1.ia64", "product_id": "kernel-trace-3.0.101-108.71.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.71.1.ia64", "product": { "name": "kernel-trace-base-3.0.101-108.71.1.ia64", "product_id": "kernel-trace-base-3.0.101-108.71.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.71.1.ia64", "product": { "name": "kernel-trace-devel-3.0.101-108.71.1.ia64", "product_id": "kernel-trace-devel-3.0.101-108.71.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-docs-3.0.101-108.71.1.noarch", "product": { "name": "kernel-docs-3.0.101-108.71.1.noarch", "product_id": "kernel-docs-3.0.101-108.71.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-bigmem-3.0.101-108.71.1.ppc64", "product": { "name": "kernel-bigmem-3.0.101-108.71.1.ppc64", "product_id": "kernel-bigmem-3.0.101-108.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-base-3.0.101-108.71.1.ppc64", "product": { "name": "kernel-bigmem-base-3.0.101-108.71.1.ppc64", "product_id": "kernel-bigmem-base-3.0.101-108.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "product": { "name": "kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "product_id": "kernel-bigmem-devel-3.0.101-108.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-108.71.1.ppc64", "product": { "name": "kernel-default-3.0.101-108.71.1.ppc64", "product_id": "kernel-default-3.0.101-108.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.71.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-108.71.1.ppc64", "product_id": "kernel-default-base-3.0.101-108.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.71.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-108.71.1.ppc64", "product_id": "kernel-default-devel-3.0.101-108.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-108.71.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-108.71.1.ppc64", "product_id": "kernel-ppc64-3.0.101-108.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-108.71.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-108.71.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-108.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-108.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.71.1.ppc64", "product": { "name": "kernel-source-3.0.101-108.71.1.ppc64", "product_id": "kernel-source-3.0.101-108.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.71.1.ppc64", "product": { "name": "kernel-syms-3.0.101-108.71.1.ppc64", "product_id": "kernel-syms-3.0.101-108.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.71.1.ppc64", "product": { "name": "kernel-trace-3.0.101-108.71.1.ppc64", "product_id": "kernel-trace-3.0.101-108.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.71.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-108.71.1.ppc64", "product_id": "kernel-trace-base-3.0.101-108.71.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.71.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-108.71.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-108.71.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.71.1.s390x", "product": { "name": "kernel-default-3.0.101-108.71.1.s390x", "product_id": "kernel-default-3.0.101-108.71.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.71.1.s390x", "product": { "name": "kernel-default-base-3.0.101-108.71.1.s390x", "product_id": "kernel-default-base-3.0.101-108.71.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.71.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-108.71.1.s390x", "product_id": "kernel-default-devel-3.0.101-108.71.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-108.71.1.s390x", "product": { "name": "kernel-default-man-3.0.101-108.71.1.s390x", "product_id": "kernel-default-man-3.0.101-108.71.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.71.1.s390x", "product": { "name": "kernel-source-3.0.101-108.71.1.s390x", "product_id": "kernel-source-3.0.101-108.71.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.71.1.s390x", "product": { "name": "kernel-syms-3.0.101-108.71.1.s390x", "product_id": "kernel-syms-3.0.101-108.71.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.71.1.s390x", "product": { "name": "kernel-trace-3.0.101-108.71.1.s390x", "product_id": "kernel-trace-3.0.101-108.71.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.71.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-108.71.1.s390x", "product_id": "kernel-trace-base-3.0.101-108.71.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.71.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-108.71.1.s390x", "product_id": "kernel-trace-devel-3.0.101-108.71.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.71.1.x86_64", "product": { "name": "kernel-default-3.0.101-108.71.1.x86_64", "product_id": "kernel-default-3.0.101-108.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.71.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-108.71.1.x86_64", "product_id": "kernel-default-base-3.0.101-108.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.71.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-108.71.1.x86_64", "product_id": "kernel-default-devel-3.0.101-108.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.71.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-108.71.1.x86_64", "product_id": "kernel-ec2-3.0.101-108.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.71.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-108.71.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-108.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.71.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-108.71.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-108.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.71.1.x86_64", "product": { "name": "kernel-source-3.0.101-108.71.1.x86_64", "product_id": "kernel-source-3.0.101-108.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.71.1.x86_64", "product": { "name": "kernel-syms-3.0.101-108.71.1.x86_64", "product_id": "kernel-syms-3.0.101-108.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.71.1.x86_64", "product": { "name": "kernel-trace-3.0.101-108.71.1.x86_64", "product_id": "kernel-trace-3.0.101-108.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.71.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-108.71.1.x86_64", "product_id": "kernel-trace-base-3.0.101-108.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.71.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-108.71.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-108.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.71.1.x86_64", "product": { "name": "kernel-xen-3.0.101-108.71.1.x86_64", "product_id": "kernel-xen-3.0.101-108.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.71.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-108.71.1.x86_64", "product_id": "kernel-xen-base-3.0.101-108.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.71.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-108.71.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-108.71.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.0.101-108.71.1.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" }, "product_reference": "kernel-docs-3.0.101-108.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586" }, "product_reference": "kernel-default-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.71.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64" }, "product_reference": "kernel-default-3.0.101-108.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-default-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x" }, "product_reference": "kernel-default-3.0.101-108.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-default-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586" }, "product_reference": "kernel-default-base-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.71.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-108.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-108.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.71.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-108.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-108.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-108.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-108.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586" }, "product_reference": "kernel-ec2-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586" }, "product_reference": "kernel-pae-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586" }, "product_reference": "kernel-source-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.71.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64" }, "product_reference": "kernel-source-3.0.101-108.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-source-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x" }, "product_reference": "kernel-source-3.0.101-108.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-source-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586" }, "product_reference": "kernel-syms-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.71.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64" }, "product_reference": "kernel-syms-3.0.101-108.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x" }, "product_reference": "kernel-syms-3.0.101-108.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586" }, "product_reference": "kernel-trace-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.71.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64" }, "product_reference": "kernel-trace-3.0.101-108.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x" }, "product_reference": "kernel-trace-3.0.101-108.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.71.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-108.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-108.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.71.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-108.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.71.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-108.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586" }, "product_reference": "kernel-xen-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586" }, "product_reference": "kernel-default-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.71.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64" }, "product_reference": "kernel-default-3.0.101-108.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-default-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x" }, "product_reference": "kernel-default-3.0.101-108.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-default-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586" }, "product_reference": "kernel-default-base-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.71.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-108.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-108.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.71.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-108.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-108.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-108.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-108.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586" }, "product_reference": "kernel-ec2-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586" }, "product_reference": "kernel-pae-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586" }, "product_reference": "kernel-source-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.71.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64" }, "product_reference": "kernel-source-3.0.101-108.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-source-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x" }, "product_reference": "kernel-source-3.0.101-108.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-source-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586" }, "product_reference": "kernel-syms-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.71.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64" }, "product_reference": "kernel-syms-3.0.101-108.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x" }, "product_reference": "kernel-syms-3.0.101-108.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586" }, "product_reference": "kernel-trace-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.71.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64" }, "product_reference": "kernel-trace-3.0.101-108.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x" }, "product_reference": "kernel-trace-3.0.101-108.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.71.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-108.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-108.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.71.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-108.71.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.71.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-108.71.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-108.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586" }, "product_reference": "kernel-xen-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.71.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-108.71.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-108.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10902" } ], "notes": [ { "category": "general", "text": "It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10902", "url": "https://www.suse.com/security/cve/CVE-2018-10902" }, { "category": "external", "summary": "SUSE Bug 1105322 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105322" }, { "category": "external", "summary": "SUSE Bug 1105323 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-09-26T12:53:30Z", "details": "low" } ], "title": "CVE-2018-10902" }, { "cve": "CVE-2018-10940", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10940" } ], "notes": [ { "category": "general", "text": "The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c in the Linux kernel before 4.16.6 allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10940", "url": "https://www.suse.com/security/cve/CVE-2018-10940" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10940", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092903 for CVE-2018-10940", "url": "https://bugzilla.suse.com/1092903" }, { "category": "external", "summary": "SUSE Bug 1107689 for CVE-2018-10940", "url": "https://bugzilla.suse.com/1107689" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-10940", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-09-26T12:53:30Z", "details": "moderate" } ], "title": "CVE-2018-10940" }, { "cve": "CVE-2018-12896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12896" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12896", "url": "https://www.suse.com/security/cve/CVE-2018-12896" }, { "category": "external", "summary": "SUSE Bug 1099922 for CVE-2018-12896", "url": "https://bugzilla.suse.com/1099922" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-09-26T12:53:30Z", "details": "low" } ], "title": "CVE-2018-12896" }, { "cve": "CVE-2018-14617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14617" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14617", "url": "https://www.suse.com/security/cve/CVE-2018-14617" }, { "category": "external", "summary": "SUSE Bug 1102870 for CVE-2018-14617", "url": "https://bugzilla.suse.com/1102870" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-09-26T12:53:30Z", "details": "moderate" } ], "title": "CVE-2018-14617" }, { "cve": "CVE-2018-14634", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14634" } ], "notes": [ { "category": "general", "text": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14634", "url": "https://www.suse.com/security/cve/CVE-2018-14634" }, { "category": "external", "summary": "SUSE Bug 1108912 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1108912" }, { "category": "external", "summary": "SUSE Bug 1108963 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1108963" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1120323 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1120323" }, { "category": "external", "summary": "SUSE Bug 1122265 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1122265" }, { "category": "external", "summary": "SUSE Bug 1188063 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1188063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-09-26T12:53:30Z", "details": "important" } ], "title": "CVE-2018-14634" }, { "cve": "CVE-2018-14734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14734" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14734", "url": "https://www.suse.com/security/cve/CVE-2018-14734" }, { "category": "external", "summary": "SUSE Bug 1103119 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1103119" }, { "category": "external", "summary": "SUSE Bug 1131390 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1131390" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-09-26T12:53:30Z", "details": "low" } ], "title": "CVE-2018-14734" }, { "cve": "CVE-2018-15572", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15572" } ], "notes": [ { "category": "general", "text": "The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15572", "url": "https://www.suse.com/security/cve/CVE-2018-15572" }, { "category": "external", "summary": "SUSE Bug 1102517 for CVE-2018-15572", "url": "https://bugzilla.suse.com/1102517" }, { "category": "external", "summary": "SUSE Bug 1105296 for CVE-2018-15572", "url": "https://bugzilla.suse.com/1105296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-09-26T12:53:30Z", "details": "important" } ], "title": "CVE-2018-15572" }, { "cve": "CVE-2018-15594", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15594" } ], "notes": [ { "category": "general", "text": "arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15594", "url": "https://www.suse.com/security/cve/CVE-2018-15594" }, { "category": "external", "summary": "SUSE Bug 1105348 for CVE-2018-15594", "url": "https://bugzilla.suse.com/1105348" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2018-15594", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-09-26T12:53:30Z", "details": "moderate" } ], "title": "CVE-2018-15594" }, { "cve": "CVE-2018-16276", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16276" } ], "notes": [ { "category": "general", "text": "An issue was discovered in yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7. Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16276", "url": "https://www.suse.com/security/cve/CVE-2018-16276" }, { "category": "external", "summary": "SUSE Bug 1106095 for CVE-2018-16276", "url": "https://bugzilla.suse.com/1106095" }, { "category": "external", "summary": "SUSE Bug 1115593 for CVE-2018-16276", "url": "https://bugzilla.suse.com/1115593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-09-26T12:53:30Z", "details": "important" } ], "title": "CVE-2018-16276" }, { "cve": "CVE-2018-16658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16658" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16658", "url": "https://www.suse.com/security/cve/CVE-2018-16658" }, { "category": "external", "summary": "SUSE Bug 1092903 for CVE-2018-16658", "url": "https://bugzilla.suse.com/1092903" }, { "category": "external", "summary": "SUSE Bug 1107689 for CVE-2018-16658", "url": "https://bugzilla.suse.com/1107689" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-16658", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-09-26T12:53:30Z", "details": "low" } ], "title": "CVE-2018-16658" }, { "cve": "CVE-2018-6554", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6554" } ], "notes": [ { "category": "general", "text": "Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6554", "url": "https://www.suse.com/security/cve/CVE-2018-6554" }, { "category": "external", "summary": "SUSE Bug 1106509 for CVE-2018-6554", "url": "https://bugzilla.suse.com/1106509" }, { "category": "external", "summary": "SUSE Bug 1106511 for CVE-2018-6554", "url": "https://bugzilla.suse.com/1106511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-09-26T12:53:30Z", "details": "low" } ], "title": "CVE-2018-6554" }, { "cve": "CVE-2018-6555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6555" } ], "notes": [ { "category": "general", "text": "The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6555", "url": "https://www.suse.com/security/cve/CVE-2018-6555" }, { "category": "external", "summary": "SUSE Bug 1106509 for CVE-2018-6555", "url": "https://bugzilla.suse.com/1106509" }, { "category": "external", "summary": "SUSE Bug 1106511 for CVE-2018-6555", "url": "https://bugzilla.suse.com/1106511" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-6555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.71.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.71.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-09-26T12:53:30Z", "details": "moderate" } ], "title": "CVE-2018-6555" } ] }
suse-su-2018:3088-1
Vulnerability from csaf_suse
Published
2018-10-09 11:51
Modified
2018-10-09 11:51
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a
local attacker to exploit this vulnerability via a SUID-root binary and obtain
full root privileges (bsc#1108912)
- CVE-2018-14617: Prevent NULL pointer dereference and panic in
hfsplus_lookup() when opening a file (that is purportedly a hard link) in an
hfs+ filesystem that has malformed catalog data, and is mounted read-only
without a metadata directory (bsc#1102870)
- CVE-2018-16276: Incorrect bounds checking in the yurex USB driver in
yurex_read allowed local attackers to use user access read/writes to crash the
kernel or potentially escalate privileges (bsc#1106095)
- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was
caused by the way the overrun accounting works. Depending on interval and
expiry time values, the overrun can be larger than INT_MAX, but the accounting
is int based. This basically made the accounting values, which are visible to
user space via timer_getoverrun(2) and siginfo::si_overrun, random. This
allowed a local user to cause a denial of service (signed integer overflow) via
crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922)
- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local
attackers to use a incorrect bounds check in the CDROM driver
CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that
could have been used by local attackers to read kernel memory (bnc#1107689)
- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a
denial of service (ias_object use-after-free and system crash) or possibly have
unspecified other impact via an AF_IRDA socket (bnc#1106511)
- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed
local users to cause a denial of service (memory consumption) by repeatedly
binding an AF_IRDA socket (bnc#1106509)
- CVE-2018-15594: Ensure correct handling of indirect calls, to prevent
attackers for conducting Spectre-v2 attacks against paravirtual guests
(bsc#1105348)
- CVE-2018-15572: The spectre_v2_select_mitigation function did not always fill
RSB upon a context switch, which made it easier for attackers to conduct
userspace-userspace spectreRSB attacks (bnc#1102517)
- CVE-2018-10902: Protect against concurrent access to prevent double realloc
(double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A
malicious local attacker could have used this for privilege escalation
(bnc#1105322).
- CVE-2018-14734: ucma_leave_multicast accessed a certain data structure after
a cleanup step in ucma_process_join, which allowed attackers to cause a denial
of service (use-after-free) (bsc#1103119)
The following non-security bugs were fixed:
- ACPI: APEI / ERST: Fix missing error handling in erst_reader() (bsc#1045538).
- ALSA: fm801: propagate TUNER_ONLY bit when autodetected (bsc#1045538).
- ALSA: pcm: Fix snd_pcm_hw_params struct copy in compat mode (bsc#1045538).
- ALSA: pcm: Use dma_bytes as size parameter in dma_mmap_coherent() (bsc#1045538).
- ALSA: pcm: fix fifo_size frame calculation (bsc#1045538).
- ALSA: snd-aoa: add of_node_put() in error path (bsc#1045538).
- ALSA: usb-audio: Add sanity checks in v2 clock parsers (bsc#1045538).
- ALSA: usb-audio: Add sanity checks to FE parser (bsc#1045538).
- ALSA: usb-audio: Fix UAC2 get_ctl request with a RANGE attribute (bsc#1045538).
- ALSA: usb-audio: Fix bogus error return in snd_usb_create_stream() (bsc#1045538).
- ALSA: usb-audio: Fix parameter block size for UAC2 control requests (bsc#1045538).
- ALSA: usb-audio: Fix parsing descriptor of UAC2 processing unit (bsc#1045538).
- ALSA: usb-audio: Fix potential out-of-bound access at parsing SU (bsc#1045538).
- ALSA: usb-audio: Set correct type for some UAC2 mixer controls (bsc#1045538).
- ASoC: blackfin: Fix missing break (bsc#1045538).
- Enforce module signatures if the kernel is locked down (bsc#1093666).
- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- PCI: Fix TI816X class code quirk (bsc#1050431).
- Refresh patches.xen/xen3-x86-l1tf-04-protect-PROT_NONE-ptes.patch (bsc#1105100).
- TPM: Zero buffer whole after copying to userspace (bsc#1050381).
- USB: serial: io_ti: fix NULL-deref in interrupt callback (bsc#1106609).
- USB: serial: sierra: fix potential deadlock at close (bsc#1100132).
- applicom: dereferencing NULL on error path (git-fixes).
- ath5k: Change led pin configuration for compaq c700 laptop (bsc#1048185).
- base: make module_create_drivers_dir race-free (git-fixes).
- block: fix an error code in add_partition() (bsc#1106209).
- btrfs: scrub: Do not use inode page cache in scrub_handle_errored_block() (bsc#1108096).
- btrfs: scrub: Do not use inode pages for device replace (bsc#1107949).
- dasd: Add IFCC notice message (bnc#1104481, LTC#170484).
- drm/i915: Remove bogus __init annotation from DMI callbacks (bsc#1106886).
- drm/nouveau/gem: off by one bugs in nouveau_gem_pushbuf_reloc_apply() (bsc#1106886).
- drm/vmwgfx: Handle vmalloc() failure in vmw_local_fifo_reserve() (bsc#1106886).
- drm: crtc: integer overflow in drm_property_create_blob() (bsc#1106886).
- fbdev: omapfb: off by one in omapfb_register_client() (bsc#1106886).
- iommu/amd: Finish TLB flush in amd_iommu_unmap() (bsc#1106105).
- iommu/amd: Fix the left value check of cmd buffer (bsc#1106105).
- iommu/amd: Free domain id when free a domain of struct dma_ops_domain (bsc#1106105).
- iommu/amd: Update Alias-DTE in update_device_table() (bsc#1106105).
- iommu/vt-d: Do not over-free page table directories (bsc#1106105).
- iommu/vt-d: Ratelimit each dmar fault printing (bsc#1106105).
- ipv6: Regenerate host route according to node pointer upon loopback up (bsc#1100705).
- ipv6: correctly add local routes when lo goes up (bsc#1100705).
- ipv6: introduce ip6_rt_put() (bsc#1100705).
- ipv6: reallocate addrconf router for ipv6 address when lo device up (bsc#1100705).
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- mm/hugetlb: add migration/hwpoisoned entry check in hugetlb_change_protection (bnc#1107071).
- mm/mempolicy.c: avoid use uninitialized preferred_node (bnc#1107064).
- modsign: log module name in the event of an error (bsc#1093666).
- modsign: print module name along with error message (bsc#1093666).
- module: make it clear when we're handling the module copy in info->hdr (bsc#1093666).
- module: setup load info before module_sig_check() (bsc#1093666).
- nbd: ratelimit error msgs after socket close (bsc#1106206).
- ncpfs: return proper error from NCP_IOC_SETROOT ioctl (bsc#1106199).
- perf/x86/intel: Add cpu_(prepare|starting|dying) for core_pmu (bsc#1104901).
- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032, git-fixes).
- powerpc/fadump: Do not use hugepages when fadump is active (bsc#1092772, bsc#1107650).
- powerpc/fadump: exclude memory holes while reserving memory in second kernel (bsc#1092772, bsc#1107650).
- powerpc/fadump: re-register firmware-assisted dump if already registered (bsc#1108170, bsc#1108823).
- powerpc/lib: Fix off-by-one in alternate feature patching (bsc#1064861).
- powerpc/lib: Fix the feature fixup tests to actually work (bsc#1064861).
- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157, git-fixes).
- powerpc: Avoid code patching freed init sections (bnc#1107735).
- powerpc: make feature-fixup tests fortify-safe (bsc#1064861).
- ptrace: fix PTRACE_LISTEN race corrupting task->state (bnc#1107001).
- qlge: Fix netdev features configuration (bsc#1098822).
- resource: fix integer overflow at reallocation (bsc#1045538).
- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources (bsc#1057199)
- s390/ftrace: use expoline for indirect branches (bnc#1106930, LTC#171029).
- s390/kernel: use expoline for indirect branches (bnc#1106930, LTC#171029).
- s390/qeth: do not clobber buffer on async TX completion (bnc#1060245, LTC#170349).
- s390: Correct register corruption in critical section cleanup (bnc#1106930, LTC#171029).
- s390: add assembler macros for CPU alternatives (bnc#1106930, LTC#171029).
- s390: detect etoken facility (bnc#1106930, LTC#171029).
- s390: move expoline assembler macros to a header (bnc#1106930, LTC#171029).
- s390: move spectre sysfs attribute code (bnc#1106930, LTC#171029).
- s390: remove indirect branch from do_softirq_own_stack (bnc#1106930, LTC#171029).
- sys: do not hold uts_sem while accessing userspace memory (bnc#1106995).
- tpm: fix race condition in tpm_common_write() (bsc#1050381).
- tracing/blktrace: Fix to allow setting same value (bsc#1106212).
- tty: vt, fix bogus division in csi_J (git-fixes).
- tty: vt, return error when con_startup fails (git-fixes).
- uml: fix hostfs mknod() (bsc#1106202).
- usb: audio-v2: Correct the comment for struct uac_clock_selector_descriptor (bsc#1045538).
- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).
- x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
- x86/init: fix build with CONFIG_SWAP=n (bsc#1105723).
- x86/mm: Prevent kernel Oops in PTDUMP code with HIGHPTE=y (bsc#1106105).
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).
- x86/vdso: Fix vDSO build if a retpoline is emitted (git-fixes).
- xen x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- xen x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- xen, x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- xen: x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
Patchnames
slertesp4-linux-kernel-13810
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a\n local attacker to exploit this vulnerability via a SUID-root binary and obtain\n full root privileges (bsc#1108912)\n- CVE-2018-14617: Prevent NULL pointer dereference and panic in\n hfsplus_lookup() when opening a file (that is purportedly a hard link) in an\n hfs+ filesystem that has malformed catalog data, and is mounted read-only\n without a metadata directory (bsc#1102870)\n- CVE-2018-16276: Incorrect bounds checking in the yurex USB driver in\n yurex_read allowed local attackers to use user access read/writes to crash the\n kernel or potentially escalate privileges (bsc#1106095)\n- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was\n caused by the way the overrun accounting works. Depending on interval and\n expiry time values, the overrun can be larger than INT_MAX, but the accounting\n is int based. This basically made the accounting values, which are visible to\n user space via timer_getoverrun(2) and siginfo::si_overrun, random. This\n allowed a local user to cause a denial of service (signed integer overflow) via\n crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922)\n- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local\n attackers to use a incorrect bounds check in the CDROM driver\n CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)\n- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that\n could have been used by local attackers to read kernel memory (bnc#1107689)\n- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a\n denial of service (ias_object use-after-free and system crash) or possibly have\n unspecified other impact via an AF_IRDA socket (bnc#1106511)\n- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed\n local users to cause a denial of service (memory consumption) by repeatedly\n binding an AF_IRDA socket (bnc#1106509)\n- CVE-2018-15594: Ensure correct handling of indirect calls, to prevent\n attackers for conducting Spectre-v2 attacks against paravirtual guests\n (bsc#1105348)\n- CVE-2018-15572: The spectre_v2_select_mitigation function did not always fill\n RSB upon a context switch, which made it easier for attackers to conduct\n userspace-userspace spectreRSB attacks (bnc#1102517)\n- CVE-2018-10902: Protect against concurrent access to prevent double realloc\n (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A\n malicious local attacker could have used this for privilege escalation\n (bnc#1105322).\n- CVE-2018-14734: ucma_leave_multicast accessed a certain data structure after\n a cleanup step in ucma_process_join, which allowed attackers to cause a denial\n of service (use-after-free) (bsc#1103119)\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI / ERST: Fix missing error handling in erst_reader() (bsc#1045538).\n- ALSA: fm801: propagate TUNER_ONLY bit when autodetected (bsc#1045538).\n- ALSA: pcm: Fix snd_pcm_hw_params struct copy in compat mode (bsc#1045538).\n- ALSA: pcm: Use dma_bytes as size parameter in dma_mmap_coherent() (bsc#1045538).\n- ALSA: pcm: fix fifo_size frame calculation (bsc#1045538).\n- ALSA: snd-aoa: add of_node_put() in error path (bsc#1045538).\n- ALSA: usb-audio: Add sanity checks in v2 clock parsers (bsc#1045538).\n- ALSA: usb-audio: Add sanity checks to FE parser (bsc#1045538).\n- ALSA: usb-audio: Fix UAC2 get_ctl request with a RANGE attribute (bsc#1045538).\n- ALSA: usb-audio: Fix bogus error return in snd_usb_create_stream() (bsc#1045538).\n- ALSA: usb-audio: Fix parameter block size for UAC2 control requests (bsc#1045538).\n- ALSA: usb-audio: Fix parsing descriptor of UAC2 processing unit (bsc#1045538).\n- ALSA: usb-audio: Fix potential out-of-bound access at parsing SU (bsc#1045538).\n- ALSA: usb-audio: Set correct type for some UAC2 mixer controls (bsc#1045538).\n- ASoC: blackfin: Fix missing break (bsc#1045538).\n- Enforce module signatures if the kernel is locked down (bsc#1093666).\n- KVM: VMX: Work around kABI breakage in \u0027enum vmx_l1d_flush_state\u0027 (bsc#1106369).\n- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).\n- PCI: Fix TI816X class code quirk (bsc#1050431).\n- Refresh patches.xen/xen3-x86-l1tf-04-protect-PROT_NONE-ptes.patch (bsc#1105100).\n- TPM: Zero buffer whole after copying to userspace (bsc#1050381).\n- USB: serial: io_ti: fix NULL-deref in interrupt callback (bsc#1106609).\n- USB: serial: sierra: fix potential deadlock at close (bsc#1100132).\n- applicom: dereferencing NULL on error path (git-fixes).\n- ath5k: Change led pin configuration for compaq c700 laptop (bsc#1048185).\n- base: make module_create_drivers_dir race-free (git-fixes).\n- block: fix an error code in add_partition() (bsc#1106209).\n- btrfs: scrub: Do not use inode page cache in scrub_handle_errored_block() (bsc#1108096).\n- btrfs: scrub: Do not use inode pages for device replace (bsc#1107949).\n- dasd: Add IFCC notice message (bnc#1104481, LTC#170484).\n- drm/i915: Remove bogus __init annotation from DMI callbacks (bsc#1106886).\n- drm/nouveau/gem: off by one bugs in nouveau_gem_pushbuf_reloc_apply() (bsc#1106886).\n- drm/vmwgfx: Handle vmalloc() failure in vmw_local_fifo_reserve() (bsc#1106886).\n- drm: crtc: integer overflow in drm_property_create_blob() (bsc#1106886).\n- fbdev: omapfb: off by one in omapfb_register_client() (bsc#1106886).\n- iommu/amd: Finish TLB flush in amd_iommu_unmap() (bsc#1106105).\n- iommu/amd: Fix the left value check of cmd buffer (bsc#1106105).\n- iommu/amd: Free domain id when free a domain of struct dma_ops_domain (bsc#1106105).\n- iommu/amd: Update Alias-DTE in update_device_table() (bsc#1106105).\n- iommu/vt-d: Do not over-free page table directories (bsc#1106105).\n- iommu/vt-d: Ratelimit each dmar fault printing (bsc#1106105).\n- ipv6: Regenerate host route according to node pointer upon loopback up (bsc#1100705).\n- ipv6: correctly add local routes when lo goes up (bsc#1100705).\n- ipv6: introduce ip6_rt_put() (bsc#1100705).\n- ipv6: reallocate addrconf router for ipv6 address when lo device up (bsc#1100705).\n- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).\n- mm/hugetlb: add migration/hwpoisoned entry check in hugetlb_change_protection (bnc#1107071).\n- mm/mempolicy.c: avoid use uninitialized preferred_node (bnc#1107064).\n- modsign: log module name in the event of an error (bsc#1093666).\n- modsign: print module name along with error message (bsc#1093666).\n- module: make it clear when we\u0027re handling the module copy in info-\u003ehdr (bsc#1093666).\n- module: setup load info before module_sig_check() (bsc#1093666).\n- nbd: ratelimit error msgs after socket close (bsc#1106206).\n- ncpfs: return proper error from NCP_IOC_SETROOT ioctl (bsc#1106199).\n- perf/x86/intel: Add cpu_(prepare|starting|dying) for core_pmu (bsc#1104901).\n- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032, git-fixes).\n- powerpc/fadump: Do not use hugepages when fadump is active (bsc#1092772, bsc#1107650).\n- powerpc/fadump: exclude memory holes while reserving memory in second kernel (bsc#1092772, bsc#1107650).\n- powerpc/fadump: re-register firmware-assisted dump if already registered (bsc#1108170, bsc#1108823).\n- powerpc/lib: Fix off-by-one in alternate feature patching (bsc#1064861).\n- powerpc/lib: Fix the feature fixup tests to actually work (bsc#1064861).\n- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157, git-fixes).\n- powerpc: Avoid code patching freed init sections (bnc#1107735).\n- powerpc: make feature-fixup tests fortify-safe (bsc#1064861).\n- ptrace: fix PTRACE_LISTEN race corrupting task-\u003estate (bnc#1107001).\n- qlge: Fix netdev features configuration (bsc#1098822).\n- resource: fix integer overflow at reallocation (bsc#1045538).\n- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources (bsc#1057199)\n- s390/ftrace: use expoline for indirect branches (bnc#1106930, LTC#171029).\n- s390/kernel: use expoline for indirect branches (bnc#1106930, LTC#171029).\n- s390/qeth: do not clobber buffer on async TX completion (bnc#1060245, LTC#170349).\n- s390: Correct register corruption in critical section cleanup (bnc#1106930, LTC#171029).\n- s390: add assembler macros for CPU alternatives (bnc#1106930, LTC#171029).\n- s390: detect etoken facility (bnc#1106930, LTC#171029).\n- s390: move expoline assembler macros to a header (bnc#1106930, LTC#171029).\n- s390: move spectre sysfs attribute code (bnc#1106930, LTC#171029).\n- s390: remove indirect branch from do_softirq_own_stack (bnc#1106930, LTC#171029).\n- sys: do not hold uts_sem while accessing userspace memory (bnc#1106995).\n- tpm: fix race condition in tpm_common_write() (bsc#1050381).\n- tracing/blktrace: Fix to allow setting same value (bsc#1106212).\n- tty: vt, fix bogus division in csi_J (git-fixes).\n- tty: vt, return error when con_startup fails (git-fixes).\n- uml: fix hostfs mknod() (bsc#1106202).\n- usb: audio-v2: Correct the comment for struct uac_clock_selector_descriptor (bsc#1045538).\n- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).\n- x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).\n- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).\n- x86/init: fix build with CONFIG_SWAP=n (bsc#1105723).\n- x86/mm: Prevent kernel Oops in PTDUMP code with HIGHPTE=y (bsc#1106105).\n- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).\n- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).\n- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).\n- x86/vdso: Fix vDSO build if a retpoline is emitted (git-fixes).\n- xen x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).\n- xen x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).\n- xen, x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).\n- xen: x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).\n", "title": "Description of the patch" }, { "category": "details", "text": "slertesp4-linux-kernel-13810", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3088-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:3088-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183088-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:3088-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" }, { "category": "self", "summary": "SUSE Bug 1045538", "url": "https://bugzilla.suse.com/1045538" }, { "category": "self", "summary": "SUSE Bug 1048185", "url": "https://bugzilla.suse.com/1048185" }, { "category": "self", "summary": "SUSE Bug 1050381", "url": "https://bugzilla.suse.com/1050381" }, { "category": "self", "summary": "SUSE Bug 1050431", "url": "https://bugzilla.suse.com/1050431" }, { "category": "self", "summary": "SUSE Bug 1057199", "url": "https://bugzilla.suse.com/1057199" }, { "category": "self", "summary": "SUSE Bug 1060245", "url": "https://bugzilla.suse.com/1060245" }, { "category": "self", "summary": "SUSE Bug 1064861", "url": "https://bugzilla.suse.com/1064861" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1080157", "url": "https://bugzilla.suse.com/1080157" }, { "category": "self", "summary": "SUSE Bug 1087081", "url": "https://bugzilla.suse.com/1087081" }, { "category": "self", "summary": "SUSE Bug 1092772", "url": "https://bugzilla.suse.com/1092772" }, { "category": "self", "summary": "SUSE Bug 1092903", "url": "https://bugzilla.suse.com/1092903" }, { "category": "self", "summary": "SUSE Bug 1093666", "url": "https://bugzilla.suse.com/1093666" }, { "category": "self", "summary": "SUSE Bug 1096547", "url": "https://bugzilla.suse.com/1096547" }, { "category": "self", "summary": "SUSE Bug 1098822", "url": "https://bugzilla.suse.com/1098822" }, { "category": "self", "summary": "SUSE Bug 1099922", "url": "https://bugzilla.suse.com/1099922" }, { "category": "self", "summary": "SUSE Bug 1100132", "url": "https://bugzilla.suse.com/1100132" }, { "category": "self", "summary": "SUSE Bug 1100705", "url": "https://bugzilla.suse.com/1100705" }, { "category": "self", "summary": "SUSE Bug 1102517", "url": "https://bugzilla.suse.com/1102517" }, { "category": "self", "summary": "SUSE Bug 1102870", "url": "https://bugzilla.suse.com/1102870" }, { "category": "self", "summary": "SUSE Bug 1103119", "url": "https://bugzilla.suse.com/1103119" }, { "category": "self", "summary": "SUSE Bug 1104481", "url": "https://bugzilla.suse.com/1104481" }, { "category": "self", "summary": "SUSE Bug 1104684", "url": "https://bugzilla.suse.com/1104684" }, { "category": "self", "summary": "SUSE Bug 1104818", "url": "https://bugzilla.suse.com/1104818" }, { "category": "self", "summary": "SUSE Bug 1104901", "url": "https://bugzilla.suse.com/1104901" }, { "category": "self", "summary": "SUSE Bug 1105100", "url": "https://bugzilla.suse.com/1105100" }, { "category": "self", "summary": "SUSE Bug 1105322", "url": "https://bugzilla.suse.com/1105322" }, { "category": "self", "summary": "SUSE Bug 1105348", "url": "https://bugzilla.suse.com/1105348" }, { "category": "self", "summary": "SUSE Bug 1105536", "url": "https://bugzilla.suse.com/1105536" }, { "category": "self", "summary": "SUSE Bug 1105723", "url": "https://bugzilla.suse.com/1105723" }, { "category": "self", "summary": "SUSE Bug 1106095", "url": "https://bugzilla.suse.com/1106095" }, { "category": "self", "summary": "SUSE Bug 1106105", "url": "https://bugzilla.suse.com/1106105" }, { "category": "self", "summary": "SUSE Bug 1106199", "url": "https://bugzilla.suse.com/1106199" }, { "category": "self", "summary": "SUSE Bug 1106202", "url": "https://bugzilla.suse.com/1106202" }, { "category": "self", "summary": "SUSE Bug 1106206", "url": "https://bugzilla.suse.com/1106206" }, { "category": "self", "summary": "SUSE Bug 1106209", "url": "https://bugzilla.suse.com/1106209" }, { "category": "self", "summary": "SUSE Bug 1106212", "url": "https://bugzilla.suse.com/1106212" }, { "category": "self", "summary": "SUSE Bug 1106369", "url": "https://bugzilla.suse.com/1106369" }, { "category": "self", "summary": "SUSE Bug 1106509", "url": "https://bugzilla.suse.com/1106509" }, { "category": "self", "summary": "SUSE Bug 1106511", "url": "https://bugzilla.suse.com/1106511" }, { "category": "self", "summary": "SUSE Bug 1106609", "url": "https://bugzilla.suse.com/1106609" }, { "category": "self", "summary": "SUSE Bug 1106886", "url": "https://bugzilla.suse.com/1106886" }, { "category": "self", "summary": "SUSE Bug 1106930", "url": "https://bugzilla.suse.com/1106930" }, { "category": "self", "summary": "SUSE Bug 1106995", "url": "https://bugzilla.suse.com/1106995" }, { "category": "self", "summary": "SUSE Bug 1107001", "url": "https://bugzilla.suse.com/1107001" }, { "category": "self", "summary": "SUSE Bug 1107064", "url": "https://bugzilla.suse.com/1107064" }, { "category": "self", "summary": "SUSE Bug 1107071", "url": "https://bugzilla.suse.com/1107071" }, { "category": "self", "summary": "SUSE Bug 1107650", "url": "https://bugzilla.suse.com/1107650" }, { "category": "self", "summary": "SUSE Bug 1107689", "url": "https://bugzilla.suse.com/1107689" }, { "category": "self", "summary": "SUSE Bug 1107735", "url": "https://bugzilla.suse.com/1107735" }, { "category": "self", "summary": "SUSE Bug 1107949", "url": "https://bugzilla.suse.com/1107949" }, { "category": "self", "summary": "SUSE Bug 1108096", "url": "https://bugzilla.suse.com/1108096" }, { "category": "self", "summary": "SUSE Bug 1108170", "url": "https://bugzilla.suse.com/1108170" }, { "category": "self", "summary": "SUSE Bug 1108823", "url": "https://bugzilla.suse.com/1108823" }, { "category": "self", "summary": "SUSE Bug 1108912", "url": "https://bugzilla.suse.com/1108912" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10902 page", "url": "https://www.suse.com/security/cve/CVE-2018-10902/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10940 page", "url": "https://www.suse.com/security/cve/CVE-2018-10940/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12896 page", "url": "https://www.suse.com/security/cve/CVE-2018-12896/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14617 page", "url": "https://www.suse.com/security/cve/CVE-2018-14617/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14634 page", "url": "https://www.suse.com/security/cve/CVE-2018-14634/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14734 page", "url": "https://www.suse.com/security/cve/CVE-2018-14734/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15572 page", "url": "https://www.suse.com/security/cve/CVE-2018-15572/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15594 page", "url": "https://www.suse.com/security/cve/CVE-2018-15594/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16276 page", "url": "https://www.suse.com/security/cve/CVE-2018-16276/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16658 page", "url": "https://www.suse.com/security/cve/CVE-2018-16658/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6554 page", "url": "https://www.suse.com/security/cve/CVE-2018-6554/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6555 page", "url": "https://www.suse.com/security/cve/CVE-2018-6555/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-10-09T11:51:04Z", "generator": { "date": "2018-10-09T11:51:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:3088-1", "initial_release_date": "2018-10-09T11:51:04Z", "revision_history": [ { "date": "2018-10-09T11:51:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-rt-3.0.101.rt130-69.36.1.x86_64", "product": { "name": "kernel-rt-3.0.101.rt130-69.36.1.x86_64", "product_id": "kernel-rt-3.0.101.rt130-69.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "product": { "name": "kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "product_id": "kernel-rt-base-3.0.101.rt130-69.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "product": { "name": "kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "product_id": "kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "product": { "name": "kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "product_id": "kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "product": { "name": "kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "product_id": "kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "product": { "name": "kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "product_id": "kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "product": { "name": "kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "product_id": "kernel-source-rt-3.0.101.rt130-69.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64", "product": { "name": "kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64", "product_id": "kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 11 SP4", "product": { "name": "SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.0.101.rt130-69.36.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64" }, "product_reference": "kernel-rt-3.0.101.rt130-69.36.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.0.101.rt130-69.36.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64" }, "product_reference": "kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64" }, "product_reference": "kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64" }, "product_reference": "kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64" }, "product_reference": "kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64" }, "product_reference": "kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.0.101.rt130-69.36.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64" }, "product_reference": "kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" }, "product_reference": "kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10902" } ], "notes": [ { "category": "general", "text": "It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10902", "url": "https://www.suse.com/security/cve/CVE-2018-10902" }, { "category": "external", "summary": "SUSE Bug 1105322 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105322" }, { "category": "external", "summary": "SUSE Bug 1105323 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:51:04Z", "details": "low" } ], "title": "CVE-2018-10902" }, { "cve": "CVE-2018-10940", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10940" } ], "notes": [ { "category": "general", "text": "The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c in the Linux kernel before 4.16.6 allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10940", "url": "https://www.suse.com/security/cve/CVE-2018-10940" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10940", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092903 for CVE-2018-10940", "url": "https://bugzilla.suse.com/1092903" }, { "category": "external", "summary": "SUSE Bug 1107689 for CVE-2018-10940", "url": "https://bugzilla.suse.com/1107689" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-10940", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:51:04Z", "details": "moderate" } ], "title": "CVE-2018-10940" }, { "cve": "CVE-2018-12896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12896" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12896", "url": "https://www.suse.com/security/cve/CVE-2018-12896" }, { "category": "external", "summary": "SUSE Bug 1099922 for CVE-2018-12896", "url": "https://bugzilla.suse.com/1099922" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:51:04Z", "details": "low" } ], "title": "CVE-2018-12896" }, { "cve": "CVE-2018-14617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14617" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14617", "url": "https://www.suse.com/security/cve/CVE-2018-14617" }, { "category": "external", "summary": "SUSE Bug 1102870 for CVE-2018-14617", "url": "https://bugzilla.suse.com/1102870" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:51:04Z", "details": "moderate" } ], "title": "CVE-2018-14617" }, { "cve": "CVE-2018-14634", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14634" } ], "notes": [ { "category": "general", "text": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14634", "url": "https://www.suse.com/security/cve/CVE-2018-14634" }, { "category": "external", "summary": "SUSE Bug 1108912 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1108912" }, { "category": "external", "summary": "SUSE Bug 1108963 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1108963" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1120323 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1120323" }, { "category": "external", "summary": "SUSE Bug 1122265 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1122265" }, { "category": "external", "summary": "SUSE Bug 1188063 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1188063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:51:04Z", "details": "important" } ], "title": "CVE-2018-14634" }, { "cve": "CVE-2018-14734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14734" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14734", "url": "https://www.suse.com/security/cve/CVE-2018-14734" }, { "category": "external", "summary": "SUSE Bug 1103119 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1103119" }, { "category": "external", "summary": "SUSE Bug 1131390 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1131390" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:51:04Z", "details": "low" } ], "title": "CVE-2018-14734" }, { "cve": "CVE-2018-15572", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15572" } ], "notes": [ { "category": "general", "text": "The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15572", "url": "https://www.suse.com/security/cve/CVE-2018-15572" }, { "category": "external", "summary": "SUSE Bug 1102517 for CVE-2018-15572", "url": "https://bugzilla.suse.com/1102517" }, { "category": "external", "summary": "SUSE Bug 1105296 for CVE-2018-15572", "url": "https://bugzilla.suse.com/1105296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:51:04Z", "details": "important" } ], "title": "CVE-2018-15572" }, { "cve": "CVE-2018-15594", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15594" } ], "notes": [ { "category": "general", "text": "arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15594", "url": "https://www.suse.com/security/cve/CVE-2018-15594" }, { "category": "external", "summary": "SUSE Bug 1105348 for CVE-2018-15594", "url": "https://bugzilla.suse.com/1105348" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2018-15594", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:51:04Z", "details": "moderate" } ], "title": "CVE-2018-15594" }, { "cve": "CVE-2018-16276", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16276" } ], "notes": [ { "category": "general", "text": "An issue was discovered in yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7. Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16276", "url": "https://www.suse.com/security/cve/CVE-2018-16276" }, { "category": "external", "summary": "SUSE Bug 1106095 for CVE-2018-16276", "url": "https://bugzilla.suse.com/1106095" }, { "category": "external", "summary": "SUSE Bug 1115593 for CVE-2018-16276", "url": "https://bugzilla.suse.com/1115593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:51:04Z", "details": "important" } ], "title": "CVE-2018-16276" }, { "cve": "CVE-2018-16658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16658" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16658", "url": "https://www.suse.com/security/cve/CVE-2018-16658" }, { "category": "external", "summary": "SUSE Bug 1092903 for CVE-2018-16658", "url": "https://bugzilla.suse.com/1092903" }, { "category": "external", "summary": "SUSE Bug 1107689 for CVE-2018-16658", "url": "https://bugzilla.suse.com/1107689" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-16658", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:51:04Z", "details": "low" } ], "title": "CVE-2018-16658" }, { "cve": "CVE-2018-6554", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6554" } ], "notes": [ { "category": "general", "text": "Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6554", "url": "https://www.suse.com/security/cve/CVE-2018-6554" }, { "category": "external", "summary": "SUSE Bug 1106509 for CVE-2018-6554", "url": "https://bugzilla.suse.com/1106509" }, { "category": "external", "summary": "SUSE Bug 1106511 for CVE-2018-6554", "url": "https://bugzilla.suse.com/1106511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:51:04Z", "details": "low" } ], "title": "CVE-2018-6554" }, { "cve": "CVE-2018-6555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6555" } ], "notes": [ { "category": "general", "text": "The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6555", "url": "https://www.suse.com/security/cve/CVE-2018-6555" }, { "category": "external", "summary": "SUSE Bug 1106509 for CVE-2018-6555", "url": "https://bugzilla.suse.com/1106509" }, { "category": "external", "summary": "SUSE Bug 1106511 for CVE-2018-6555", "url": "https://bugzilla.suse.com/1106511" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-6555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.36.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-09T11:51:04Z", "details": "moderate" } ], "title": "CVE-2018-6555" } ] }
suse-su-2018:2908-2
Vulnerability from csaf_suse
Published
2019-04-27 13:55
Modified
2019-04-27 13:55
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 kernel was updated receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a
local attacker to exploit this vulnerability via a SUID-root binary and obtain
full root privileges (bsc#1108912)
- CVE-2018-14617: Prevent NULL pointer dereference and panic in
hfsplus_lookup() when opening a file (that is purportedly a hard link) in an
hfs+ filesystem that has malformed catalog data, and is mounted read-only
without a metadata directory (bsc#1102870)
- CVE-2018-16276: Incorrect bounds checking in the yurex USB driver in
yurex_read allowed local attackers to use user access read/writes to crash the
kernel or potentially escalate privileges (bsc#1106095)
- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was
caused by the way the overrun accounting works. Depending on interval and
expiry time values, the overrun can be larger than INT_MAX, but the accounting
is int based. This basically made the accounting values, which are visible to
user space via timer_getoverrun(2) and siginfo::si_overrun, random. This
allowed a local user to cause a denial of service (signed integer overflow) via
crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922)
- CVE-2018-13093: Prevent NULL pointer dereference and panic in lookup_slow()
on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image.
This occured because of a lack of proper validation that cached inodes are free
during allocation (bnc#1100001)
- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local
attackers to use a incorrect bounds check in the CDROM driver
CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that
could have been used by local attackers to read kernel memory (bnc#1107689)
- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a
denial of service (ias_object use-after-free and system crash) or possibly have
unspecified other impact via an AF_IRDA socket (bnc#1106511)
- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed
local users to cause a denial of service (memory consumption) by repeatedly
binding an AF_IRDA socket (bnc#1106509)
- CVE-2018-10902: Protect against concurrent access to prevent double realloc
(double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A
malicious local attacker could have used this for privilege escalation
(bnc#1105322)
- CVE-2018-10879: A local user could have caused a use-after-free in
ext4_xattr_set_entry function and a denial of service or unspecified other
impact by renaming a file in a crafted ext4 filesystem image (bsc#1099844)
- CVE-2018-10883: A local user could have caused an out-of-bounds write in
jbd2_journal_dirty_metadata(), a denial of service, and a system crash by
mounting and operating on a crafted ext4 filesystem image (bsc#1099863)
- CVE-2018-10880: Prevent stack-out-of-bounds write in the ext4 filesystem code
when mounting and writing to a crafted ext4 image in ext4_update_inline_data().
An attacker could have used this to cause a system crash and a denial of
service (bsc#1099845)
- CVE-2018-10882: A local user could have caused an out-of-bound write, a
denial of service, and a system crash by unmounting a crafted ext4 filesystem
image (bsc#1099849)
- CVE-2018-10881: A local user could have caused an out-of-bound access in
ext4_get_group_info function, a denial of service, and a system crash by
mounting and operating on a crafted ext4 filesystem image (bsc#1099864)
- CVE-2018-10877: Prevent out-of-bound access in the ext4_ext_drop_refs()
function when operating on a crafted ext4 filesystem image (bsc#1099846)
- CVE-2018-10876: A use-after-free was possible in ext4_ext_remove_space()
function when mounting and operating a crafted ext4 image (bsc#1099811)
- CVE-2018-10878: A local user could have caused an out-of-bounds write and a
denial of service or unspecified other impact by mounting and operating a
crafted ext4 filesystem image (bsc#1099813)
- CVE-2018-10853: The KVM hypervisor did not check current privilege(CPL) level
while emulating unprivileged instructions. An unprivileged guest user/process
could have used this flaw to potentially escalate privileges inside guest
(bsc#1097104).
The following non-security bugs were fixed:
- KEYS: prevent creating a different user's keyrings (bnc#1065999).
- KVM: MMU: always terminate page walks at level 1 (bsc#1062604).
- KVM: MMU: simplify last_pte_bitmap (bsc#1062604).
- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- KVM: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).
- Refresh patches.xen/xen3-x86-l1tf-04-protect-PROT_NONE-ptes.patch (bsc#1105100).
- Do not report CPU affected by L1TF when ARCH_CAP_RDCL_NO bit is set (bsc#1104906).
- Revert '- Disable patches.arch/x86-mm-Simplify-p-g4um-d_page-macros.patch' (bnc#1104818)
- bcache: avoid unncessary cache prefetch bch_btree_node_get().
- bcache: calculate the number of incremental GC nodes according to the total of btree nodes.
- bcache: display rate debug parameters to 0 when writeback is not running.
- bcache: do not check return value of debugfs_create_dir().
- bcache: finish incremental GC.
- bcache: fix I/O significant decline while backend devices registering.
- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064233).
- bcache: free heap cache_set->flush_btree in bch_journal_free.
- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section.
- bcache: release dc->writeback_lock properly in bch_writeback_thread().
- bcache: set max writeback rate when I/O request is idle (bsc#1064233).
- bcache: simplify the calculation of the total amount of flash dirty data.
- cifs: Fix infinite loop when using hard mount option (bsc#1091171).
- ext4: check for allocation block validity with block group locked (bsc#1104495).
- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).
- restore cond_resched() in shrink_dcache_parent().
- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).
- x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104818).
- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).
- xen, x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104818).
- xfs: Remove dead code from inode recover function (bsc#1105396).
- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).
- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).
- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).
- xfs: protect inode ->di_dmstate with a spinlock (bsc#1024788).
- xfs: repair malformed inode items during log recovery (bsc#1105396).
Patchnames
SUSE-SLE-SAP-12-SP1-2019-1065
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP1 kernel was updated receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a\n local attacker to exploit this vulnerability via a SUID-root binary and obtain\n full root privileges (bsc#1108912)\n- CVE-2018-14617: Prevent NULL pointer dereference and panic in\n hfsplus_lookup() when opening a file (that is purportedly a hard link) in an\n hfs+ filesystem that has malformed catalog data, and is mounted read-only\n without a metadata directory (bsc#1102870)\n- CVE-2018-16276: Incorrect bounds checking in the yurex USB driver in\n yurex_read allowed local attackers to use user access read/writes to crash the\n kernel or potentially escalate privileges (bsc#1106095)\n- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was\n caused by the way the overrun accounting works. Depending on interval and\n expiry time values, the overrun can be larger than INT_MAX, but the accounting\n is int based. This basically made the accounting values, which are visible to\n user space via timer_getoverrun(2) and siginfo::si_overrun, random. This\n allowed a local user to cause a denial of service (signed integer overflow) via\n crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922)\n- CVE-2018-13093: Prevent NULL pointer dereference and panic in lookup_slow()\n on a NULL inode-\u003ei_ops pointer when doing pathwalks on a corrupted xfs image.\n This occured because of a lack of proper validation that cached inodes are free\n during allocation (bnc#1100001)\n- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local\n attackers to use a incorrect bounds check in the CDROM driver\n CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)\n- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that\n could have been used by local attackers to read kernel memory (bnc#1107689)\n- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a\n denial of service (ias_object use-after-free and system crash) or possibly have\n unspecified other impact via an AF_IRDA socket (bnc#1106511)\n- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed\n local users to cause a denial of service (memory consumption) by repeatedly\n binding an AF_IRDA socket (bnc#1106509)\n- CVE-2018-10902: Protect against concurrent access to prevent double realloc\n (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A\n malicious local attacker could have used this for privilege escalation\n (bnc#1105322)\n- CVE-2018-10879: A local user could have caused a use-after-free in\n ext4_xattr_set_entry function and a denial of service or unspecified other\n impact by renaming a file in a crafted ext4 filesystem image (bsc#1099844)\n- CVE-2018-10883: A local user could have caused an out-of-bounds write in\n jbd2_journal_dirty_metadata(), a denial of service, and a system crash by\n mounting and operating on a crafted ext4 filesystem image (bsc#1099863)\n- CVE-2018-10880: Prevent stack-out-of-bounds write in the ext4 filesystem code\n when mounting and writing to a crafted ext4 image in ext4_update_inline_data().\n An attacker could have used this to cause a system crash and a denial of\n service (bsc#1099845)\n- CVE-2018-10882: A local user could have caused an out-of-bound write, a\n denial of service, and a system crash by unmounting a crafted ext4 filesystem\n image (bsc#1099849)\n- CVE-2018-10881: A local user could have caused an out-of-bound access in\n ext4_get_group_info function, a denial of service, and a system crash by\n mounting and operating on a crafted ext4 filesystem image (bsc#1099864)\n- CVE-2018-10877: Prevent out-of-bound access in the ext4_ext_drop_refs()\n function when operating on a crafted ext4 filesystem image (bsc#1099846)\n- CVE-2018-10876: A use-after-free was possible in ext4_ext_remove_space()\n function when mounting and operating a crafted ext4 image (bsc#1099811)\n- CVE-2018-10878: A local user could have caused an out-of-bounds write and a\n denial of service or unspecified other impact by mounting and operating a\n crafted ext4 filesystem image (bsc#1099813)\n- CVE-2018-10853: The KVM hypervisor did not check current privilege(CPL) level\n while emulating unprivileged instructions. An unprivileged guest user/process\n could have used this flaw to potentially escalate privileges inside guest\n (bsc#1097104).\n\nThe following non-security bugs were fixed:\n\n- KEYS: prevent creating a different user\u0027s keyrings (bnc#1065999).\n- KVM: MMU: always terminate page walks at level 1 (bsc#1062604).\n- KVM: MMU: simplify last_pte_bitmap (bsc#1062604).\n- KVM: VMX: Work around kABI breakage in \u0027enum vmx_l1d_flush_state\u0027 (bsc#1106369).\n- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).\n- KVM: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).\n- Refresh patches.xen/xen3-x86-l1tf-04-protect-PROT_NONE-ptes.patch (bsc#1105100).\n- Do not report CPU affected by L1TF when ARCH_CAP_RDCL_NO bit is set (bsc#1104906).\n- Revert \u0027- Disable patches.arch/x86-mm-Simplify-p-g4um-d_page-macros.patch\u0027 (bnc#1104818) \n- bcache: avoid unncessary cache prefetch bch_btree_node_get().\n- bcache: calculate the number of incremental GC nodes according to the total of btree nodes.\n- bcache: display rate debug parameters to 0 when writeback is not running.\n- bcache: do not check return value of debugfs_create_dir().\n- bcache: finish incremental GC.\n- bcache: fix I/O significant decline while backend devices registering.\n- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064233).\n- bcache: free heap cache_set-\u003eflush_btree in bch_journal_free.\n- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section.\n- bcache: release dc-\u003ewriteback_lock properly in bch_writeback_thread().\n- bcache: set max writeback rate when I/O request is idle (bsc#1064233).\n- bcache: simplify the calculation of the total amount of flash dirty data.\n- cifs: Fix infinite loop when using hard mount option (bsc#1091171).\n- ext4: check for allocation block validity with block group locked (bsc#1104495).\n- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).\n- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).\n- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).\n- restore cond_resched() in shrink_dcache_parent().\n- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).\n- x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104818).\n- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).\n- xen, x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104818).\n- xfs: Remove dead code from inode recover function (bsc#1105396).\n- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).\n- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).\n- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).\n- xfs: protect inode -\u003edi_dmstate with a spinlock (bsc#1024788).\n- xfs: repair malformed inode items during log recovery (bsc#1105396).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2019-1065", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2908-2.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2908-2", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182908-2/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2908-2", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1024788", "url": "https://bugzilla.suse.com/1024788" }, { "category": "self", "summary": "SUSE Bug 1062604", "url": "https://bugzilla.suse.com/1062604" }, { "category": "self", "summary": "SUSE Bug 1064233", "url": "https://bugzilla.suse.com/1064233" }, { "category": "self", "summary": "SUSE Bug 1065999", "url": "https://bugzilla.suse.com/1065999" }, { "category": "self", "summary": "SUSE Bug 1090534", "url": "https://bugzilla.suse.com/1090534" }, { "category": "self", "summary": "SUSE Bug 1090955", "url": "https://bugzilla.suse.com/1090955" }, { "category": "self", "summary": "SUSE Bug 1091171", "url": "https://bugzilla.suse.com/1091171" }, { "category": "self", "summary": "SUSE Bug 1092903", "url": "https://bugzilla.suse.com/1092903" }, { "category": "self", "summary": "SUSE Bug 1096547", "url": "https://bugzilla.suse.com/1096547" }, { "category": "self", "summary": "SUSE Bug 1097104", "url": "https://bugzilla.suse.com/1097104" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099811", "url": "https://bugzilla.suse.com/1099811" }, { "category": "self", "summary": "SUSE Bug 1099813", "url": "https://bugzilla.suse.com/1099813" }, { "category": "self", "summary": "SUSE Bug 1099844", "url": "https://bugzilla.suse.com/1099844" }, { "category": "self", "summary": "SUSE Bug 1099845", "url": "https://bugzilla.suse.com/1099845" }, { "category": "self", "summary": "SUSE Bug 1099846", "url": "https://bugzilla.suse.com/1099846" }, { "category": "self", "summary": "SUSE Bug 1099849", "url": "https://bugzilla.suse.com/1099849" }, { "category": "self", "summary": "SUSE Bug 1099863", "url": "https://bugzilla.suse.com/1099863" }, { "category": "self", "summary": "SUSE Bug 1099864", "url": "https://bugzilla.suse.com/1099864" }, { "category": "self", "summary": "SUSE Bug 1099922", "url": "https://bugzilla.suse.com/1099922" }, { "category": "self", "summary": "SUSE Bug 1100001", "url": "https://bugzilla.suse.com/1100001" }, { "category": "self", "summary": "SUSE Bug 1102870", "url": "https://bugzilla.suse.com/1102870" }, { "category": "self", "summary": "SUSE Bug 1103445", "url": "https://bugzilla.suse.com/1103445" }, { "category": "self", "summary": "SUSE Bug 1104319", "url": "https://bugzilla.suse.com/1104319" }, { "category": "self", "summary": "SUSE Bug 1104495", "url": "https://bugzilla.suse.com/1104495" }, { "category": "self", "summary": "SUSE Bug 1104818", "url": "https://bugzilla.suse.com/1104818" }, { "category": "self", "summary": "SUSE Bug 1104906", "url": "https://bugzilla.suse.com/1104906" }, { "category": "self", "summary": "SUSE Bug 1105100", "url": "https://bugzilla.suse.com/1105100" }, { "category": "self", "summary": "SUSE Bug 1105322", "url": "https://bugzilla.suse.com/1105322" }, { "category": "self", "summary": "SUSE Bug 1105323", "url": "https://bugzilla.suse.com/1105323" }, { "category": "self", "summary": "SUSE Bug 1105396", "url": "https://bugzilla.suse.com/1105396" }, { "category": "self", "summary": "SUSE Bug 1106095", "url": "https://bugzilla.suse.com/1106095" }, { "category": "self", "summary": "SUSE Bug 1106369", "url": "https://bugzilla.suse.com/1106369" }, { "category": "self", "summary": "SUSE Bug 1106509", "url": "https://bugzilla.suse.com/1106509" }, { "category": "self", "summary": "SUSE Bug 1106511", "url": "https://bugzilla.suse.com/1106511" }, { "category": "self", "summary": "SUSE Bug 1107689", "url": "https://bugzilla.suse.com/1107689" }, { "category": "self", "summary": "SUSE Bug 1108912", "url": "https://bugzilla.suse.com/1108912" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10876 page", "url": "https://www.suse.com/security/cve/CVE-2018-10876/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10877 page", "url": "https://www.suse.com/security/cve/CVE-2018-10877/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10878 page", "url": "https://www.suse.com/security/cve/CVE-2018-10878/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10879 page", "url": "https://www.suse.com/security/cve/CVE-2018-10879/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10880 page", "url": "https://www.suse.com/security/cve/CVE-2018-10880/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10881 page", "url": "https://www.suse.com/security/cve/CVE-2018-10881/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10882 page", "url": "https://www.suse.com/security/cve/CVE-2018-10882/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10883 page", "url": "https://www.suse.com/security/cve/CVE-2018-10883/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10902 page", "url": "https://www.suse.com/security/cve/CVE-2018-10902/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10940 page", "url": "https://www.suse.com/security/cve/CVE-2018-10940/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12896 page", "url": "https://www.suse.com/security/cve/CVE-2018-12896/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13093 page", "url": "https://www.suse.com/security/cve/CVE-2018-13093/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14617 page", "url": "https://www.suse.com/security/cve/CVE-2018-14617/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14634 page", "url": "https://www.suse.com/security/cve/CVE-2018-14634/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16276 page", "url": "https://www.suse.com/security/cve/CVE-2018-16276/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16658 page", "url": "https://www.suse.com/security/cve/CVE-2018-16658/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6554 page", "url": "https://www.suse.com/security/cve/CVE-2018-6554/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6555 page", "url": "https://www.suse.com/security/cve/CVE-2018-6555/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-04-27T13:55:00Z", "generator": { "date": "2019-04-27T13:55:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2908-2", "initial_release_date": "2019-04-27T13:55:00Z", "revision_history": [ { "date": "2019-04-27T13:55:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.74-60.64.104.1.noarch", "product": { "name": "kernel-devel-3.12.74-60.64.104.1.noarch", "product_id": "kernel-devel-3.12.74-60.64.104.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.74-60.64.104.1.noarch", "product": { "name": "kernel-macros-3.12.74-60.64.104.1.noarch", "product_id": "kernel-macros-3.12.74-60.64.104.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.74-60.64.104.1.noarch", "product": { "name": "kernel-source-3.12.74-60.64.104.1.noarch", "product_id": "kernel-source-3.12.74-60.64.104.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.104.1.x86_64", "product": { "name": "kernel-default-3.12.74-60.64.104.1.x86_64", "product_id": "kernel-default-3.12.74-60.64.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.104.1.x86_64", "product": { "name": "kernel-default-base-3.12.74-60.64.104.1.x86_64", "product_id": "kernel-default-base-3.12.74-60.64.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.104.1.x86_64", "product": { "name": "kernel-default-devel-3.12.74-60.64.104.1.x86_64", "product_id": "kernel-default-devel-3.12.74-60.64.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.104.1.x86_64", "product": { "name": "kernel-syms-3.12.74-60.64.104.1.x86_64", "product_id": "kernel-syms-3.12.74-60.64.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.74-60.64.104.1.x86_64", "product": { "name": "kernel-xen-3.12.74-60.64.104.1.x86_64", "product_id": "kernel-xen-3.12.74-60.64.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.74-60.64.104.1.x86_64", "product": { "name": "kernel-xen-base-3.12.74-60.64.104.1.x86_64", "product_id": "kernel-xen-base-3.12.74-60.64.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "product_id": "kernel-xen-devel-3.12.74-60.64.104.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.104.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.104.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.104.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.104.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.104.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.104.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T13:55:00Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-10876", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10876" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10876", "url": "https://www.suse.com/security/cve/CVE-2018-10876" }, { "category": "external", "summary": "SUSE Bug 1099811 for CVE-2018-10876", "url": "https://bugzilla.suse.com/1099811" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T13:55:00Z", "details": "moderate" } ], "title": "CVE-2018-10876" }, { "cve": "CVE-2018-10877", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10877" } ], "notes": [ { "category": "general", "text": "Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10877", "url": "https://www.suse.com/security/cve/CVE-2018-10877" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10877", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099846 for CVE-2018-10877", "url": "https://bugzilla.suse.com/1099846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T13:55:00Z", "details": "moderate" } ], "title": "CVE-2018-10877" }, { "cve": "CVE-2018-10878", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10878" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10878", "url": "https://www.suse.com/security/cve/CVE-2018-10878" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10878", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099813 for CVE-2018-10878", "url": "https://bugzilla.suse.com/1099813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T13:55:00Z", "details": "moderate" } ], "title": "CVE-2018-10878" }, { "cve": "CVE-2018-10879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10879" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10879", "url": "https://www.suse.com/security/cve/CVE-2018-10879" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10879", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099844 for CVE-2018-10879", "url": "https://bugzilla.suse.com/1099844" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T13:55:00Z", "details": "moderate" } ], "title": "CVE-2018-10879" }, { "cve": "CVE-2018-10880", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10880" } ], "notes": [ { "category": "general", "text": "Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10880", "url": "https://www.suse.com/security/cve/CVE-2018-10880" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10880", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099845 for CVE-2018-10880", "url": "https://bugzilla.suse.com/1099845" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T13:55:00Z", "details": "moderate" } ], "title": "CVE-2018-10880" }, { "cve": "CVE-2018-10881", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10881" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10881", "url": "https://www.suse.com/security/cve/CVE-2018-10881" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10881", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099864 for CVE-2018-10881", "url": "https://bugzilla.suse.com/1099864" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T13:55:00Z", "details": "moderate" } ], "title": "CVE-2018-10881" }, { "cve": "CVE-2018-10882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10882" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10882", "url": "https://www.suse.com/security/cve/CVE-2018-10882" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10882", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099849 for CVE-2018-10882", "url": "https://bugzilla.suse.com/1099849" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T13:55:00Z", "details": "moderate" } ], "title": "CVE-2018-10882" }, { "cve": "CVE-2018-10883", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10883" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10883", "url": "https://www.suse.com/security/cve/CVE-2018-10883" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10883", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099863 for CVE-2018-10883", "url": "https://bugzilla.suse.com/1099863" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T13:55:00Z", "details": "moderate" } ], "title": "CVE-2018-10883" }, { "cve": "CVE-2018-10902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10902" } ], "notes": [ { "category": "general", "text": "It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10902", "url": "https://www.suse.com/security/cve/CVE-2018-10902" }, { "category": "external", "summary": "SUSE Bug 1105322 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105322" }, { "category": "external", "summary": "SUSE Bug 1105323 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T13:55:00Z", "details": "low" } ], "title": "CVE-2018-10902" }, { "cve": "CVE-2018-10940", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10940" } ], "notes": [ { "category": "general", "text": "The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c in the Linux kernel before 4.16.6 allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10940", "url": "https://www.suse.com/security/cve/CVE-2018-10940" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10940", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092903 for CVE-2018-10940", "url": "https://bugzilla.suse.com/1092903" }, { "category": "external", "summary": "SUSE Bug 1107689 for CVE-2018-10940", "url": "https://bugzilla.suse.com/1107689" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-10940", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T13:55:00Z", "details": "moderate" } ], "title": "CVE-2018-10940" }, { "cve": "CVE-2018-12896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12896" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12896", "url": "https://www.suse.com/security/cve/CVE-2018-12896" }, { "category": "external", "summary": "SUSE Bug 1099922 for CVE-2018-12896", "url": "https://bugzilla.suse.com/1099922" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T13:55:00Z", "details": "low" } ], "title": "CVE-2018-12896" }, { "cve": "CVE-2018-13093", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13093" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/xfs/xfs_icache.c in the Linux kernel through 4.17.3. There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode-\u003ei_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13093", "url": "https://www.suse.com/security/cve/CVE-2018-13093" }, { "category": "external", "summary": "SUSE Bug 1100001 for CVE-2018-13093", "url": "https://bugzilla.suse.com/1100001" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T13:55:00Z", "details": "moderate" } ], "title": "CVE-2018-13093" }, { "cve": "CVE-2018-14617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14617" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14617", "url": "https://www.suse.com/security/cve/CVE-2018-14617" }, { "category": "external", "summary": "SUSE Bug 1102870 for CVE-2018-14617", "url": "https://bugzilla.suse.com/1102870" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T13:55:00Z", "details": "moderate" } ], "title": "CVE-2018-14617" }, { "cve": "CVE-2018-14634", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14634" } ], "notes": [ { "category": "general", "text": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14634", "url": "https://www.suse.com/security/cve/CVE-2018-14634" }, { "category": "external", "summary": "SUSE Bug 1108912 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1108912" }, { "category": "external", "summary": "SUSE Bug 1108963 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1108963" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1120323 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1120323" }, { "category": "external", "summary": "SUSE Bug 1122265 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1122265" }, { "category": "external", "summary": "SUSE Bug 1188063 for CVE-2018-14634", "url": "https://bugzilla.suse.com/1188063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T13:55:00Z", "details": "important" } ], "title": "CVE-2018-14634" }, { "cve": "CVE-2018-16276", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16276" } ], "notes": [ { "category": "general", "text": "An issue was discovered in yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7. Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16276", "url": "https://www.suse.com/security/cve/CVE-2018-16276" }, { "category": "external", "summary": "SUSE Bug 1106095 for CVE-2018-16276", "url": "https://bugzilla.suse.com/1106095" }, { "category": "external", "summary": "SUSE Bug 1115593 for CVE-2018-16276", "url": "https://bugzilla.suse.com/1115593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T13:55:00Z", "details": "important" } ], "title": "CVE-2018-16276" }, { "cve": "CVE-2018-16658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16658" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16658", "url": "https://www.suse.com/security/cve/CVE-2018-16658" }, { "category": "external", "summary": "SUSE Bug 1092903 for CVE-2018-16658", "url": "https://bugzilla.suse.com/1092903" }, { "category": "external", "summary": "SUSE Bug 1107689 for CVE-2018-16658", "url": "https://bugzilla.suse.com/1107689" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-16658", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T13:55:00Z", "details": "low" } ], "title": "CVE-2018-16658" }, { "cve": "CVE-2018-6554", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6554" } ], "notes": [ { "category": "general", "text": "Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6554", "url": "https://www.suse.com/security/cve/CVE-2018-6554" }, { "category": "external", "summary": "SUSE Bug 1106509 for CVE-2018-6554", "url": "https://bugzilla.suse.com/1106509" }, { "category": "external", "summary": "SUSE Bug 1106511 for CVE-2018-6554", "url": "https://bugzilla.suse.com/1106511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T13:55:00Z", "details": "low" } ], "title": "CVE-2018-6554" }, { "cve": "CVE-2018-6555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6555" } ], "notes": [ { "category": "general", "text": "The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6555", "url": "https://www.suse.com/security/cve/CVE-2018-6555" }, { "category": "external", "summary": "SUSE Bug 1106509 for CVE-2018-6555", "url": "https://bugzilla.suse.com/1106509" }, { "category": "external", "summary": "SUSE Bug 1106511 for CVE-2018-6555", "url": "https://bugzilla.suse.com/1106511" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-6555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T13:55:00Z", "details": "moderate" } ], "title": "CVE-2018-6555" } ] }
rhsa-2018:2924
Vulnerability from csaf_redhat
Published
2018-10-16 14:50
Modified
2025-08-02 08:09
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)
* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)
* kernel: Integer overflow in Linux's create_elf_tables function (CVE-2018-14634)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390 and CVE-2018-5391 and Qualys Research Labs for reporting CVE-2018-14634.
Bug Fix(es):
* After updating the system to prevent the L1 Terminal Fault (L1TF) vulnerability, only one thread was detected on systems that offer processing of two threads on a single processor core. With this update, the "__max_smt_threads()" function has been fixed. As a result, both threads are now detected correctly in the described situation. (BZ#1625334)
* Previously, a kernel panic occurred when the kernel tried to make an out of bound access to the array that describes the L1 Terminal Fault (L1TF) mitigation state on systems without Extended Page Tables (EPT) support. This update extends the array of mitigation states to cover all the states, which effectively prevents out of bound array access. Also, this update enables rejecting invalid, irrelevant values, that might be erroneously provided by the userspace. As a result, the kernel no longer panics in the described scenario. (BZ#1629633)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\n* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)\n\n* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)\n\n* kernel: Integer overflow in Linux\u0027s create_elf_tables function (CVE-2018-14634)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390 and CVE-2018-5391 and Qualys Research Labs for reporting CVE-2018-14634.\n\nBug Fix(es):\n\n* After updating the system to prevent the L1 Terminal Fault (L1TF) vulnerability, only one thread was detected on systems that offer processing of two threads on a single processor core. With this update, the \"__max_smt_threads()\" function has been fixed. As a result, both threads are now detected correctly in the described situation. (BZ#1625334)\n\n* Previously, a kernel panic occurred when the kernel tried to make an out of bound access to the array that describes the L1 Terminal Fault (L1TF) mitigation state on systems without Extended Page Tables (EPT) support. This update extends the array of mitigation states to cover all the states, which effectively prevents out of bound array access. Also, this update enables rejecting invalid, irrelevant values, that might be erroneously provided by the userspace. As a result, the kernel no longer panics in the described scenario. (BZ#1629633)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2924", "url": "https://access.redhat.com/errata/RHSA-2018:2924" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy", "url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy" }, { "category": "external", "summary": "1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "external", "summary": "1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2924.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T08:09:51+00:00", "generator": { "date": "2025-08-02T08:09:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2924", "initial_release_date": "2018-10-16T14:50:38+00:00", "revision_history": [ { "date": "2018-10-16T14:50:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-10-16T14:50:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:09:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:6.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:6.6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-504.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-504.76.2.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-504.76.2.el6.x86_64", "product_id": "python-perf-0:2.6.32-504.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-504.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-504.76.2.el6.x86_64", "product": { "name": "kernel-0:2.6.32-504.76.2.el6.x86_64", "product_id": "kernel-0:2.6.32-504.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-504.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-504.76.2.el6.x86_64", "product": { "name": "perf-0:2.6.32-504.76.2.el6.x86_64", "product_id": "perf-0:2.6.32-504.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-504.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.76.2.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-504.76.2.el6.src", "product": { "name": "kernel-0:2.6.32-504.76.2.el6.src", "product_id": "kernel-0:2.6.32-504.76.2.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-504.76.2.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.32-504.76.2.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-504.76.2.el6.noarch", "product_id": "kernel-doc-0:2.6.32-504.76.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-504.76.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-504.76.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-504.76.2.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.76.2.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src" }, "product_reference": "kernel-0:2.6.32-504.76.2.el6.src", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.76.2.el6.noarch", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.76.2.el6.src as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src" }, "product_reference": "kernel-0:2.6.32-504.76.2.el6.src", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.76.2.el6.noarch", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.76.2.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src" }, "product_reference": "kernel-0:2.6.32-504.76.2.el6.src", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.76.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.76.2.el6.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src" }, "product_reference": "kernel-0:2.6.32-504.76.2.el6.src", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.76.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-16T14:50:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2924" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5391", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1609664" } ], "notes": [ { "category": "description", "text": "A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "RHBZ#1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5391", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5391" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/641765", "url": "https://www.kb.cert.org/vuls/id/641765" } ], "release_date": "2018-08-14T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-16T14:50:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2924" }, { "category": "workaround", "details": "One may change the default 4MB and 3MB values of net.ipv4.ipfrag_high_thresh and net.ipv4.ipfrag_low_thresh (and their ipv6 counterparts net.ipv6.ipfrag_high_thresh and net.ipv6.ipfrag_low_thresh) to 256 kB and 192 kB (respectively) or below. Tests show some to significant CPU saturation drop during an attack, depending on a hardware, configuration and environment.\n\nThere can be some impact on performance though, due to ipfrag_high_thresh of 262144 bytes, as only two 64K fragments can fit in the reassembly queue at the same time. For example, there is a risk of breaking applications that rely on large UDP packets.\n\nSee the Mitigation section in the https://access.redhat.com/articles/3553061 article for the script to quickly change to/from default and lower settings.", "product_ids": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)" }, { "cve": "CVE-2018-10675", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1575065" } ], "notes": [ { "category": "description", "text": "The do_get_mempolicy() function in mm/mempolicy.c in the Linux kernel allows local users to hit a use-after-free bug via crafted system calls and thus cause a denial of service (DoS) or possibly have unspecified other impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10675" }, { "category": "external", "summary": "RHBZ#1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10675", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675" } ], "release_date": "2017-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-16T14:50:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2924" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact" }, { "acknowledgments": [ { "names": [ "Qualys Research Labs" ] } ], "cve": "CVE-2018-14634", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2018-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1624498" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in Linux\u0027s create_elf_tables function", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect 32-bit systems as they do not have a large enough address space to exploit this flaw.\n\nSystems with less than 32GB of memory are very unlikely to be affected by this issue due to memory demands during exploitation.\n\nThis issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the version of the kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 will address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14634" }, { "category": "external", "summary": "RHBZ#1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14634", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14634" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy", "url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2018/09/25/4", "url": "https://www.openwall.com/lists/oss-security/2018/09/25/4" } ], "release_date": "2018-09-25T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-16T14:50:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2924" }, { "category": "workaround", "details": "To mitigate the issue:\n\nEnable and install kernel-debuginfo packages as per https://access.redhat.com/solutions/666123\n\n1) On the host, save the following in a file with the \".stp\" extension:\n\n// CVE-2018-14634\n//\n// Theory of operations: adjust the thread\u0027s # rlimit-in-effect around\n// calls to the vulnerable get_arg_page() function so as to encompass\n// the newly required _STK_LIM / 4 * 3 maximum.\n\n// Complication: the rlimit is stored in a current-\u003e structure that\n// is shared across the threads of the process. They may concurrently\n// invoke this operation.\n\nfunction clamp_stack_rlim_cur:long ()\n%{\n struct rlimit *rlim = current-\u003esignal-\u003erlim;\n unsigned long rlim_cur = READ_ONCE(rlim[RLIMIT_STACK].rlim_cur);\n\n unsigned long limit = _STK_LIM / 4 * 3;\n limit *= 4; // multiply it back up, to the scale used by rlim_cur\n\n if (rlim_cur \u003e limit) {\n WRITE_ONCE(rlim[RLIMIT_STACK].rlim_cur, limit);\n STAP_RETURN(limit);\n } else\n STAP_RETURN(0);\n%}\n\nprobe kernel.function(\"copy_strings\").call\n{\n l = clamp_stack_rlim_cur()\n if (l)\n printf(\"lowered process %s(%d) STACK rlim_cur to %p\\n\",\n execname(), pid(), l)\n}\n\nprobe begin {\n\tprintf(\"CVE-2018-14634 mitigation loaded\\n\")\n\n}\n\nprobe end {\n\tprintf(\"CVE-2018-14634 mitigation unloaded\\n\")\n}\n\n2) Install the \"systemtap\" package and any required dependencies. Refer\nto the \"2. Using SystemTap\" chapter in the Red Hat Enterprise Linux\n\"SystemTap Beginners Guide\" document, available from docs.redhat.com,\nfor information on installing the required -debuginfo and matching kernel-devel packages\n\n3) Run the \"stap -g [filename-from-step-1].stp\" command as root.\n\nIf the host is rebooted, the changes will be lost and the script must be\nrun again.\n\n\nAlternatively, build the systemtap script on a development system with\n\"stap -g -p 4 [filename-from-step-1].stp\", distribute the resulting\nkernel module to all affected systems, and run \"staprun -L \u003cmodule\u003e\" on those.\nWhen using this approach only systemtap-runtime package is required on\nthe affected systems. Please notice that the kernel version must be the same\nacross all systems.\n\n\nThis may not be a suitable workaround if your application uses massive amounts of stack space. Please consider this if there are any adverse affects when running this mitigation.", "product_ids": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Integer overflow in Linux\u0027s create_elf_tables function" } ] }
rhsa-2018:2846
Vulnerability from csaf_redhat
Published
2018-10-09 16:00
Modified
2025-08-02 08:09
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)
* kernel: Integer overflow in Linux's create_elf_tables function (CVE-2018-14634)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5391 and Qualys Research Labs for reporting CVE-2018-14634.
Bug Fix(es):
These updated kernel packages include also numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article:
https://access.redhat.com/articles/3635371
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)\n\n* kernel: Integer overflow in Linux\u0027s create_elf_tables function (CVE-2018-14634)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5391 and Qualys Research Labs for reporting CVE-2018-14634.\n\nBug Fix(es):\n\nThese updated kernel packages include also numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article:\n\nhttps://access.redhat.com/articles/3635371", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2846", "url": "https://access.redhat.com/errata/RHSA-2018:2846" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/3635371", "url": "https://access.redhat.com/articles/3635371" }, { "category": "external", "summary": "1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "external", "summary": "1616397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616397" }, { "category": "external", "summary": "1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2846.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T08:09:44+00:00", "generator": { "date": "2025-08-02T08:09:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2846", "initial_release_date": "2018-10-09T16:00:39+00:00", "revision_history": [ { "date": "2018-10-09T16:00:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-10-09T16:00:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:09:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.6.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.6.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.6.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.6.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-754.6.3.el6.x86_64", "product": { "name": "kernel-0:2.6.32-754.6.3.el6.x86_64", "product_id": "kernel-0:2.6.32-754.6.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.6.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.6.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.6.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.6.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.6.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.6.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.6.3.el6.x86_64", "product": { "name": "perf-0:2.6.32-754.6.3.el6.x86_64", "product_id": "perf-0:2.6.32-754.6.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.6.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.6.3.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-754.6.3.el6.x86_64", "product_id": "python-perf-0:2.6.32-754.6.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.6.3.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.6.3.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.6.3.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.6.3.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.6.3.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.6.3.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.6.3.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.6.3.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.i686", "product_id": "kernel-debug-0:2.6.32-754.6.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.6.3.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.6.3.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.i686", "product_id": "kernel-devel-0:2.6.32-754.6.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.6.3.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-754.6.3.el6.i686", "product": { "name": "kernel-0:2.6.32-754.6.3.el6.i686", "product_id": "kernel-0:2.6.32-754.6.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.6.3.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.6.3.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.i686", "product_id": "kernel-headers-0:2.6.32-754.6.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.6.3.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.6.3.el6.i686", "product": { "name": "perf-0:2.6.32-754.6.3.el6.i686", "product_id": "perf-0:2.6.32-754.6.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.6.3.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.6.3.el6.i686", "product": { "name": "python-perf-0:2.6.32-754.6.3.el6.i686", "product_id": "python-perf-0:2.6.32-754.6.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.6.3.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.32-754.6.3.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-754.6.3.el6.noarch", "product_id": "kernel-doc-0:2.6.32-754.6.3.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.6.3.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.6.3.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.6.3.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-754.6.3.el6.src", "product": { "name": "kernel-0:2.6.32-754.6.3.el6.src", "product_id": "kernel-0:2.6.32-754.6.3.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.6.3.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.6.3.el6.s390x", "product": { "name": "python-perf-0:2.6.32-754.6.3.el6.s390x", "product_id": "python-perf-0:2.6.32-754.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.6.3.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.s390x", "product_id": "kernel-debug-0:2.6.32-754.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.6.3.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.s390x", "product_id": "kernel-devel-0:2.6.32-754.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-754.6.3.el6.s390x", "product": { "name": "kernel-0:2.6.32-754.6.3.el6.s390x", "product_id": "kernel-0:2.6.32-754.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.6.3.el6.s390x", "product": { "name": "perf-0:2.6.32-754.6.3.el6.s390x", "product_id": "perf-0:2.6.32-754.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.6.3.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.s390x", "product_id": "kernel-headers-0:2.6.32-754.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.6.3.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.6.3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "product_id": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.6.3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.6.3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-754.6.3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.6.3.el6.ppc64", "product": { "name": "python-perf-0:2.6.32-754.6.3.el6.ppc64", "product_id": "python-perf-0:2.6.32-754.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.6.3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.6.3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.6.3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.6.3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-754.6.3.el6.ppc64", "product": { "name": "kernel-0:2.6.32-754.6.3.el6.ppc64", "product_id": "kernel-0:2.6.32-754.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.6.3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.6.3.el6.ppc64", "product": { "name": "perf-0:2.6.32-754.6.3.el6.ppc64", "product_id": "perf-0:2.6.32-754.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.6.3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.6.3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.6.3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-754.6.3.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.src" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.src", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.6.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.6.3.el6.noarch", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.6.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.src", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.6.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.6.3.el6.noarch", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.6.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.src" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.src", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.6.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.6.3.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.6.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.src", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.6.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.6.3.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.6.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.src" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.src", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.6.3.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.6.3.el6.noarch", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.6.3.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.src", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.6.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.6.3.el6.noarch", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.6.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.src" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.src", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.6.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.6.3.el6.noarch", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.6.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.src", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.6.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.6.3.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.6.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5391", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1609664" } ], "notes": [ { "category": "description", "text": "A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "RHBZ#1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5391", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5391" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/641765", "url": "https://www.kb.cert.org/vuls/id/641765" } ], "release_date": "2018-08-14T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-09T16:00:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2846" }, { "category": "workaround", "details": "One may change the default 4MB and 3MB values of net.ipv4.ipfrag_high_thresh and net.ipv4.ipfrag_low_thresh (and their ipv6 counterparts net.ipv6.ipfrag_high_thresh and net.ipv6.ipfrag_low_thresh) to 256 kB and 192 kB (respectively) or below. Tests show some to significant CPU saturation drop during an attack, depending on a hardware, configuration and environment.\n\nThere can be some impact on performance though, due to ipfrag_high_thresh of 262144 bytes, as only two 64K fragments can fit in the reassembly queue at the same time. For example, there is a risk of breaking applications that rely on large UDP packets.\n\nSee the Mitigation section in the https://access.redhat.com/articles/3553061 article for the script to quickly change to/from default and lower settings.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)" }, { "acknowledgments": [ { "names": [ "Qualys Research Labs" ] } ], "cve": "CVE-2018-14634", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2018-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1624498" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in Linux\u0027s create_elf_tables function", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect 32-bit systems as they do not have a large enough address space to exploit this flaw.\n\nSystems with less than 32GB of memory are very unlikely to be affected by this issue due to memory demands during exploitation.\n\nThis issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the version of the kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 will address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14634" }, { "category": "external", "summary": "RHBZ#1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14634", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14634" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy", "url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2018/09/25/4", "url": "https://www.openwall.com/lists/oss-security/2018/09/25/4" } ], "release_date": "2018-09-25T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-09T16:00:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2846" }, { "category": "workaround", "details": "To mitigate the issue:\n\nEnable and install kernel-debuginfo packages as per https://access.redhat.com/solutions/666123\n\n1) On the host, save the following in a file with the \".stp\" extension:\n\n// CVE-2018-14634\n//\n// Theory of operations: adjust the thread\u0027s # rlimit-in-effect around\n// calls to the vulnerable get_arg_page() function so as to encompass\n// the newly required _STK_LIM / 4 * 3 maximum.\n\n// Complication: the rlimit is stored in a current-\u003e structure that\n// is shared across the threads of the process. They may concurrently\n// invoke this operation.\n\nfunction clamp_stack_rlim_cur:long ()\n%{\n struct rlimit *rlim = current-\u003esignal-\u003erlim;\n unsigned long rlim_cur = READ_ONCE(rlim[RLIMIT_STACK].rlim_cur);\n\n unsigned long limit = _STK_LIM / 4 * 3;\n limit *= 4; // multiply it back up, to the scale used by rlim_cur\n\n if (rlim_cur \u003e limit) {\n WRITE_ONCE(rlim[RLIMIT_STACK].rlim_cur, limit);\n STAP_RETURN(limit);\n } else\n STAP_RETURN(0);\n%}\n\nprobe kernel.function(\"copy_strings\").call\n{\n l = clamp_stack_rlim_cur()\n if (l)\n printf(\"lowered process %s(%d) STACK rlim_cur to %p\\n\",\n execname(), pid(), l)\n}\n\nprobe begin {\n\tprintf(\"CVE-2018-14634 mitigation loaded\\n\")\n\n}\n\nprobe end {\n\tprintf(\"CVE-2018-14634 mitigation unloaded\\n\")\n}\n\n2) Install the \"systemtap\" package and any required dependencies. Refer\nto the \"2. Using SystemTap\" chapter in the Red Hat Enterprise Linux\n\"SystemTap Beginners Guide\" document, available from docs.redhat.com,\nfor information on installing the required -debuginfo and matching kernel-devel packages\n\n3) Run the \"stap -g [filename-from-step-1].stp\" command as root.\n\nIf the host is rebooted, the changes will be lost and the script must be\nrun again.\n\n\nAlternatively, build the systemtap script on a development system with\n\"stap -g -p 4 [filename-from-step-1].stp\", distribute the resulting\nkernel module to all affected systems, and run \"staprun -L \u003cmodule\u003e\" on those.\nWhen using this approach only systemtap-runtime package is required on\nthe affected systems. Please notice that the kernel version must be the same\nacross all systems.\n\n\nThis may not be a suitable workaround if your application uses massive amounts of stack space. Please consider this if there are any adverse affects when running this mitigation.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.6.3.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.6.3.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.6.3.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.6.3.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.6.3.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Integer overflow in Linux\u0027s create_elf_tables function" } ] }
rhsa-2018:3643
Vulnerability from csaf_redhat
Published
2018-11-20 19:57
Modified
2025-08-02 08:10
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Integer overflow in Linux's create_elf_tables function (CVE-2018-14634)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Qualys Research Labs for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Integer overflow in Linux\u0027s create_elf_tables function (CVE-2018-14634)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Qualys Research Labs for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:3643", "url": "https://access.redhat.com/errata/RHSA-2018:3643" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy", "url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy" }, { "category": "external", "summary": "1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3643.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T08:10:41+00:00", "generator": { "date": "2025-08-02T08:10:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:3643", "initial_release_date": "2018-11-20T19:57:57+00:00", "revision_history": [ { "date": "2018-11-20T19:57:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-11-20T19:57:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:10:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.4::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:2.6.32-358.94.1.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-358.94.1.el6.x86_64", "product_id": "python-perf-0:2.6.32-358.94.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-358.94.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-358.94.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-358.94.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-358.94.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.94.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.94.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-358.94.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-358.94.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-358.94.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-358.94.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-358.94.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-358.94.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-358.94.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-358.94.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-358.94.1.el6.x86_64", "product_id": "kernel-0:2.6.32-358.94.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-358.94.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-358.94.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-358.94.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-358.94.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-358.94.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-358.94.1.el6.x86_64", "product": { "name": "perf-0:2.6.32-358.94.1.el6.x86_64", "product_id": "perf-0:2.6.32-358.94.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-358.94.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-358.94.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-358.94.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-358.94.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-358.94.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-358.94.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-358.94.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-358.94.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-358.94.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-358.94.1.el6.src", "product": { "name": "kernel-0:2.6.32-358.94.1.el6.src", "product_id": "kernel-0:2.6.32-358.94.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-358.94.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.32-358.94.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-358.94.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-358.94.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-358.94.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-358.94.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-358.94.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-358.94.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-358.94.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.94.1.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.94.1.el6.src" }, "product_reference": "kernel-0:2.6.32-358.94.1.el6.src", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.94.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.94.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-358.94.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-358.94.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.94.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-358.94.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-358.94.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.94.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-358.94.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.94.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-358.94.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-358.94.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.94.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.94.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.94.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.94.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-358.94.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.94.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-358.94.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-358.94.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.94.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-358.94.1.el6.noarch", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-358.94.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.94.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-358.94.1.el6.noarch", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-358.94.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.94.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-358.94.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-358.94.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:perf-0:2.6.32-358.94.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-358.94.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-358.94.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:python-perf-0:2.6.32-358.94.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-358.94.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.94.1.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.94.1.el6.src" }, "product_reference": "kernel-0:2.6.32-358.94.1.el6.src", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.94.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.94.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-358.94.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-358.94.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.94.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-358.94.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-358.94.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.94.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-358.94.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.94.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-358.94.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-358.94.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.94.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.94.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.94.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.94.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-358.94.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.94.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-358.94.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-358.94.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.94.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-358.94.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-358.94.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.94.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-358.94.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-358.94.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.94.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-358.94.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-358.94.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:perf-0:2.6.32-358.94.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-358.94.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-358.94.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.94.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-358.94.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Qualys Research Labs" ] } ], "cve": "CVE-2018-14634", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2018-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1624498" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in Linux\u0027s create_elf_tables function", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect 32-bit systems as they do not have a large enough address space to exploit this flaw.\n\nSystems with less than 32GB of memory are very unlikely to be affected by this issue due to memory demands during exploitation.\n\nThis issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the version of the kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 will address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.94.1.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.94.1.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.94.1.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.94.1.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.94.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.94.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14634" }, { "category": "external", "summary": "RHBZ#1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14634", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14634" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy", "url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2018/09/25/4", "url": "https://www.openwall.com/lists/oss-security/2018/09/25/4" } ], "release_date": "2018-09-25T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-20T19:57:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.94.1.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.94.1.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.94.1.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.94.1.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.94.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.94.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:3643" }, { "category": "workaround", "details": "To mitigate the issue:\n\nEnable and install kernel-debuginfo packages as per https://access.redhat.com/solutions/666123\n\n1) On the host, save the following in a file with the \".stp\" extension:\n\n// CVE-2018-14634\n//\n// Theory of operations: adjust the thread\u0027s # rlimit-in-effect around\n// calls to the vulnerable get_arg_page() function so as to encompass\n// the newly required _STK_LIM / 4 * 3 maximum.\n\n// Complication: the rlimit is stored in a current-\u003e structure that\n// is shared across the threads of the process. They may concurrently\n// invoke this operation.\n\nfunction clamp_stack_rlim_cur:long ()\n%{\n struct rlimit *rlim = current-\u003esignal-\u003erlim;\n unsigned long rlim_cur = READ_ONCE(rlim[RLIMIT_STACK].rlim_cur);\n\n unsigned long limit = _STK_LIM / 4 * 3;\n limit *= 4; // multiply it back up, to the scale used by rlim_cur\n\n if (rlim_cur \u003e limit) {\n WRITE_ONCE(rlim[RLIMIT_STACK].rlim_cur, limit);\n STAP_RETURN(limit);\n } else\n STAP_RETURN(0);\n%}\n\nprobe kernel.function(\"copy_strings\").call\n{\n l = clamp_stack_rlim_cur()\n if (l)\n printf(\"lowered process %s(%d) STACK rlim_cur to %p\\n\",\n execname(), pid(), l)\n}\n\nprobe begin {\n\tprintf(\"CVE-2018-14634 mitigation loaded\\n\")\n\n}\n\nprobe end {\n\tprintf(\"CVE-2018-14634 mitigation unloaded\\n\")\n}\n\n2) Install the \"systemtap\" package and any required dependencies. Refer\nto the \"2. Using SystemTap\" chapter in the Red Hat Enterprise Linux\n\"SystemTap Beginners Guide\" document, available from docs.redhat.com,\nfor information on installing the required -debuginfo and matching kernel-devel packages\n\n3) Run the \"stap -g [filename-from-step-1].stp\" command as root.\n\nIf the host is rebooted, the changes will be lost and the script must be\nrun again.\n\n\nAlternatively, build the systemtap script on a development system with\n\"stap -g -p 4 [filename-from-step-1].stp\", distribute the resulting\nkernel module to all affected systems, and run \"staprun -L \u003cmodule\u003e\" on those.\nWhen using this approach only systemtap-runtime package is required on\nthe affected systems. Please notice that the kernel version must be the same\nacross all systems.\n\n\nThis may not be a suitable workaround if your application uses massive amounts of stack space. Please consider this if there are any adverse affects when running this mitigation.", "product_ids": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.94.1.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.94.1.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.94.1.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.94.1.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.94.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.94.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.94.1.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.94.1.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.94.1.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.94.1.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.94.1.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.94.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.94.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.94.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.94.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Integer overflow in Linux\u0027s create_elf_tables function" } ] }
rhsa-2018:2933
Vulnerability from csaf_redhat
Published
2018-10-16 18:56
Modified
2025-08-02 08:10
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)
* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)
* kernel: Integer overflow in Linux's create_elf_tables function (CVE-2018-14634)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390 and CVE-2018-5391 and Qualys Research Labs for reporting CVE-2018-14634.
Bug Fix(es):
* Previously, invalid headers in the sk_buff struct led to an indefinite loop in the tcp_collapse() function. As a consequence, the system became unresponsive. This update backports the upstream changes that remove the problematic code in tcp_collapse(). As a result, the system no longer hangs in the described scenario. (BZ#1619630)
* After updating the system to prevent the L1 Terminal Fault (L1TF) vulnerability, only one thread was detected on systems that offer processing of two threads on a single processor core. With this update, the "__max_smt_threads()" function has been fixed. As a result, both threads are now detected correctly in the described situation. (BZ#1625333)
* Previously, a kernel panic occurred when the kernel tried to make an out of bound access to the array that describes the L1 Terminal Fault (L1TF) mitigation state on systems without Extended Page Tables (EPT) support. This update extends the array of mitigation states to cover all the states, which effectively prevents out of bound array access. Also, this update enables rejecting invalid, irrelevant values, that might be erroneously provided by the userspace. As a result, the kernel no longer panics in the described scenario. (BZ#1629632)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\n* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)\n\n* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)\n\n* kernel: Integer overflow in Linux\u0027s create_elf_tables function (CVE-2018-14634)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390 and CVE-2018-5391 and Qualys Research Labs for reporting CVE-2018-14634.\n\nBug Fix(es):\n\n* Previously, invalid headers in the sk_buff struct led to an indefinite loop in the tcp_collapse() function. As a consequence, the system became unresponsive. This update backports the upstream changes that remove the problematic code in tcp_collapse(). As a result, the system no longer hangs in the described scenario. (BZ#1619630)\n\n* After updating the system to prevent the L1 Terminal Fault (L1TF) vulnerability, only one thread was detected on systems that offer processing of two threads on a single processor core. With this update, the \"__max_smt_threads()\" function has been fixed. As a result, both threads are now detected correctly in the described situation. (BZ#1625333)\n\n* Previously, a kernel panic occurred when the kernel tried to make an out of bound access to the array that describes the L1 Terminal Fault (L1TF) mitigation state on systems without Extended Page Tables (EPT) support. This update extends the array of mitigation states to cover all the states, which effectively prevents out of bound array access. Also, this update enables rejecting invalid, irrelevant values, that might be erroneously provided by the userspace. As a result, the kernel no longer panics in the described scenario. (BZ#1629632)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2933", "url": "https://access.redhat.com/errata/RHSA-2018:2933" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy", "url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy" }, { "category": "external", "summary": "1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "external", "summary": "1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2933.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T08:10:40+00:00", "generator": { "date": "2025-08-02T08:10:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2933", "initial_release_date": "2018-10-16T18:56:07+00:00", "revision_history": [ { "date": "2018-10-16T18:56:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-10-16T18:56:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:10:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.5)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-431.93.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-431.93.2.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-431.93.2.el6.x86_64", "product_id": "python-perf-0:2.6.32-431.93.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-431.93.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-431.93.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-431.93.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-431.93.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-431.93.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-431.93.2.el6.x86_64", "product": { "name": "kernel-0:2.6.32-431.93.2.el6.x86_64", "product_id": "kernel-0:2.6.32-431.93.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-431.93.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-431.93.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-431.93.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-431.93.2.el6.x86_64", "product": { "name": "perf-0:2.6.32-431.93.2.el6.x86_64", "product_id": "perf-0:2.6.32-431.93.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-431.93.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-431.93.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-431.93.2.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-431.93.2.el6.src", "product": { "name": "kernel-0:2.6.32-431.93.2.el6.src", "product_id": "kernel-0:2.6.32-431.93.2.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-431.93.2.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.32-431.93.2.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-431.93.2.el6.noarch", "product_id": "kernel-doc-0:2.6.32-431.93.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-431.93.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-431.93.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-431.93.2.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.93.2.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src" }, "product_reference": "kernel-0:2.6.32-431.93.2.el6.src", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-431.93.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-431.93.2.el6.noarch", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-431.93.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.93.2.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src" }, "product_reference": "kernel-0:2.6.32-431.93.2.el6.src", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-431.93.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-431.93.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-431.93.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-16T18:56:07+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2933" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5391", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1609664" } ], "notes": [ { "category": "description", "text": "A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "RHBZ#1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5391", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5391" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/641765", "url": "https://www.kb.cert.org/vuls/id/641765" } ], "release_date": "2018-08-14T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-16T18:56:07+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2933" }, { "category": "workaround", "details": "One may change the default 4MB and 3MB values of net.ipv4.ipfrag_high_thresh and net.ipv4.ipfrag_low_thresh (and their ipv6 counterparts net.ipv6.ipfrag_high_thresh and net.ipv6.ipfrag_low_thresh) to 256 kB and 192 kB (respectively) or below. Tests show some to significant CPU saturation drop during an attack, depending on a hardware, configuration and environment.\n\nThere can be some impact on performance though, due to ipfrag_high_thresh of 262144 bytes, as only two 64K fragments can fit in the reassembly queue at the same time. For example, there is a risk of breaking applications that rely on large UDP packets.\n\nSee the Mitigation section in the https://access.redhat.com/articles/3553061 article for the script to quickly change to/from default and lower settings.", "product_ids": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)" }, { "cve": "CVE-2018-10675", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1575065" } ], "notes": [ { "category": "description", "text": "The do_get_mempolicy() function in mm/mempolicy.c in the Linux kernel allows local users to hit a use-after-free bug via crafted system calls and thus cause a denial of service (DoS) or possibly have unspecified other impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10675" }, { "category": "external", "summary": "RHBZ#1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10675", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675" } ], "release_date": "2017-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-16T18:56:07+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2933" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact" }, { "acknowledgments": [ { "names": [ "Qualys Research Labs" ] } ], "cve": "CVE-2018-14634", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2018-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1624498" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in Linux\u0027s create_elf_tables function", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect 32-bit systems as they do not have a large enough address space to exploit this flaw.\n\nSystems with less than 32GB of memory are very unlikely to be affected by this issue due to memory demands during exploitation.\n\nThis issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the version of the kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 will address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14634" }, { "category": "external", "summary": "RHBZ#1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14634", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14634" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy", "url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2018/09/25/4", "url": "https://www.openwall.com/lists/oss-security/2018/09/25/4" } ], "release_date": "2018-09-25T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-16T18:56:07+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2933" }, { "category": "workaround", "details": "To mitigate the issue:\n\nEnable and install kernel-debuginfo packages as per https://access.redhat.com/solutions/666123\n\n1) On the host, save the following in a file with the \".stp\" extension:\n\n// CVE-2018-14634\n//\n// Theory of operations: adjust the thread\u0027s # rlimit-in-effect around\n// calls to the vulnerable get_arg_page() function so as to encompass\n// the newly required _STK_LIM / 4 * 3 maximum.\n\n// Complication: the rlimit is stored in a current-\u003e structure that\n// is shared across the threads of the process. They may concurrently\n// invoke this operation.\n\nfunction clamp_stack_rlim_cur:long ()\n%{\n struct rlimit *rlim = current-\u003esignal-\u003erlim;\n unsigned long rlim_cur = READ_ONCE(rlim[RLIMIT_STACK].rlim_cur);\n\n unsigned long limit = _STK_LIM / 4 * 3;\n limit *= 4; // multiply it back up, to the scale used by rlim_cur\n\n if (rlim_cur \u003e limit) {\n WRITE_ONCE(rlim[RLIMIT_STACK].rlim_cur, limit);\n STAP_RETURN(limit);\n } else\n STAP_RETURN(0);\n%}\n\nprobe kernel.function(\"copy_strings\").call\n{\n l = clamp_stack_rlim_cur()\n if (l)\n printf(\"lowered process %s(%d) STACK rlim_cur to %p\\n\",\n execname(), pid(), l)\n}\n\nprobe begin {\n\tprintf(\"CVE-2018-14634 mitigation loaded\\n\")\n\n}\n\nprobe end {\n\tprintf(\"CVE-2018-14634 mitigation unloaded\\n\")\n}\n\n2) Install the \"systemtap\" package and any required dependencies. Refer\nto the \"2. Using SystemTap\" chapter in the Red Hat Enterprise Linux\n\"SystemTap Beginners Guide\" document, available from docs.redhat.com,\nfor information on installing the required -debuginfo and matching kernel-devel packages\n\n3) Run the \"stap -g [filename-from-step-1].stp\" command as root.\n\nIf the host is rebooted, the changes will be lost and the script must be\nrun again.\n\n\nAlternatively, build the systemtap script on a development system with\n\"stap -g -p 4 [filename-from-step-1].stp\", distribute the resulting\nkernel module to all affected systems, and run \"staprun -L \u003cmodule\u003e\" on those.\nWhen using this approach only systemtap-runtime package is required on\nthe affected systems. Please notice that the kernel version must be the same\nacross all systems.\n\n\nThis may not be a suitable workaround if your application uses massive amounts of stack space. Please consider this if there are any adverse affects when running this mitigation.", "product_ids": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Integer overflow in Linux\u0027s create_elf_tables function" } ] }
rhsa-2018:2763
Vulnerability from csaf_redhat
Published
2018-09-25 19:06
Modified
2025-08-02 08:10
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: Integer overflow in Linux's create_elf_tables function (CVE-2018-14634)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Qualys Research Labs for reporting this issue.
Bug Fix(es):
* The kernel-rt packages have been upgraded to the 3.10.0-862.14.3 source tree, which provides a number of bug fixes over the previous version. (BZ#1616429)
* Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1617941)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Integer overflow in Linux\u0027s create_elf_tables function (CVE-2018-14634)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Qualys Research Labs for reporting this issue.\n\nBug Fix(es):\n\n* The kernel-rt packages have been upgraded to the 3.10.0-862.14.3 source tree, which provides a number of bug fixes over the previous version. (BZ#1616429)\n\n* Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1617941)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2763", "url": "https://access.redhat.com/errata/RHSA-2018:2763" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1616429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616429" }, { "category": "external", "summary": "1617941", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617941" }, { "category": "external", "summary": "1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2763.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-02T08:10:11+00:00", "generator": { "date": "2025-08-02T08:10:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2763", "initial_release_date": "2018-09-25T19:06:13+00:00", "revision_history": [ { "date": "2018-09-25T19:06:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-09-25T19:06:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:10:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product": { "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product": { "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debug-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product": { "name": "kernel-rt-debug-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_id": "kernel-rt-debug-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-862.14.4.rt56.821.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product": { "name": "kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_id": "kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-862.14.4.rt56.821.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-862.14.4.rt56.821.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product": { "name": "kernel-rt-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_id": "kernel-rt-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-862.14.4.rt56.821.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-862.14.4.rt56.821.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_id": "kernel-rt-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-862.14.4.rt56.821.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-862.14.4.rt56.821.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_id": "kernel-rt-debug-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-862.14.4.rt56.821.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-862.14.4.rt56.821.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product": { "name": "kernel-rt-debug-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_id": "kernel-rt-debug-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-862.14.4.rt56.821.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product": { "name": "kernel-rt-trace-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_id": "kernel-rt-trace-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-862.14.4.rt56.821.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-862.14.4.rt56.821.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_id": "kernel-rt-trace-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-862.14.4.rt56.821.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-862.14.4.rt56.821.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product": { "name": "kernel-rt-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_id": "kernel-rt-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-862.14.4.rt56.821.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product": { "name": "kernel-rt-trace-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_id": "kernel-rt-trace-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-862.14.4.rt56.821.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.src", "product": { "name": "kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.src", "product_id": "kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-862.14.4.rt56.821.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:3.10.0-862.14.4.rt56.821.el7.noarch", "product": { "name": "kernel-rt-doc-0:3.10.0-862.14.4.rt56.821.el7.noarch", "product_id": "kernel-rt-doc-0:3.10.0-862.14.4.rt56.821.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-862.14.4.rt56.821.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.src", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-862.14.4.rt56.821.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.14.4.rt56.821.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-862.14.4.rt56.821.el7.noarch", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.src", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-862.14.4.rt56.821.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.14.4.rt56.821.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-862.14.4.rt56.821.el7.noarch", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Qualys Research Labs" ] } ], "cve": "CVE-2018-14634", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2018-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1624498" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in Linux\u0027s create_elf_tables function", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect 32-bit systems as they do not have a large enough address space to exploit this flaw.\n\nSystems with less than 32GB of memory are very unlikely to be affected by this issue due to memory demands during exploitation.\n\nThis issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the version of the kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 will address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.14.4.rt56.821.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.14.4.rt56.821.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14634" }, { "category": "external", "summary": "RHBZ#1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14634", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14634" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy", "url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2018/09/25/4", "url": "https://www.openwall.com/lists/oss-security/2018/09/25/4" } ], "release_date": "2018-09-25T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-09-25T19:06:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.14.4.rt56.821.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.14.4.rt56.821.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2763" }, { "category": "workaround", "details": "To mitigate the issue:\n\nEnable and install kernel-debuginfo packages as per https://access.redhat.com/solutions/666123\n\n1) On the host, save the following in a file with the \".stp\" extension:\n\n// CVE-2018-14634\n//\n// Theory of operations: adjust the thread\u0027s # rlimit-in-effect around\n// calls to the vulnerable get_arg_page() function so as to encompass\n// the newly required _STK_LIM / 4 * 3 maximum.\n\n// Complication: the rlimit is stored in a current-\u003e structure that\n// is shared across the threads of the process. They may concurrently\n// invoke this operation.\n\nfunction clamp_stack_rlim_cur:long ()\n%{\n struct rlimit *rlim = current-\u003esignal-\u003erlim;\n unsigned long rlim_cur = READ_ONCE(rlim[RLIMIT_STACK].rlim_cur);\n\n unsigned long limit = _STK_LIM / 4 * 3;\n limit *= 4; // multiply it back up, to the scale used by rlim_cur\n\n if (rlim_cur \u003e limit) {\n WRITE_ONCE(rlim[RLIMIT_STACK].rlim_cur, limit);\n STAP_RETURN(limit);\n } else\n STAP_RETURN(0);\n%}\n\nprobe kernel.function(\"copy_strings\").call\n{\n l = clamp_stack_rlim_cur()\n if (l)\n printf(\"lowered process %s(%d) STACK rlim_cur to %p\\n\",\n execname(), pid(), l)\n}\n\nprobe begin {\n\tprintf(\"CVE-2018-14634 mitigation loaded\\n\")\n\n}\n\nprobe end {\n\tprintf(\"CVE-2018-14634 mitigation unloaded\\n\")\n}\n\n2) Install the \"systemtap\" package and any required dependencies. Refer\nto the \"2. Using SystemTap\" chapter in the Red Hat Enterprise Linux\n\"SystemTap Beginners Guide\" document, available from docs.redhat.com,\nfor information on installing the required -debuginfo and matching kernel-devel packages\n\n3) Run the \"stap -g [filename-from-step-1].stp\" command as root.\n\nIf the host is rebooted, the changes will be lost and the script must be\nrun again.\n\n\nAlternatively, build the systemtap script on a development system with\n\"stap -g -p 4 [filename-from-step-1].stp\", distribute the resulting\nkernel module to all affected systems, and run \"staprun -L \u003cmodule\u003e\" on those.\nWhen using this approach only systemtap-runtime package is required on\nthe affected systems. Please notice that the kernel version must be the same\nacross all systems.\n\n\nThis may not be a suitable workaround if your application uses massive amounts of stack space. Please consider this if there are any adverse affects when running this mitigation.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.14.4.rt56.821.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.14.4.rt56.821.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.14.4.rt56.821.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.14.4.rt56.821.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.14.4.rt56.821.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.14.4.rt56.821.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Integer overflow in Linux\u0027s create_elf_tables function" } ] }
rhsa-2018:3540
Vulnerability from csaf_redhat
Published
2018-11-13 16:36
Modified
2025-08-02 08:10
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)
* kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c (CVE-2017-18344)
* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)
* kernel: Integer overflow in Linux's create_elf_tables function (CVE-2018-14634)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5391 and Qualys Research Labs for reporting CVE-2018-14634.
Bug Fix(es):
These updated kernel packages include also numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article: https://access.redhat.com/articles/3684891
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)\n\n* kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c (CVE-2017-18344)\n\n* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)\n\n* kernel: Integer overflow in Linux\u0027s create_elf_tables function (CVE-2018-14634)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5391 and Qualys Research Labs for reporting CVE-2018-14634.\n\nBug Fix(es):\n\nThese updated kernel packages include also numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article: https://access.redhat.com/articles/3684891", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:3540", "url": "https://access.redhat.com/errata/RHSA-2018:3540" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy", "url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy" }, { "category": "external", "summary": "https://access.redhat.com/articles/3684891", "url": "https://access.redhat.com/articles/3684891" }, { "category": "external", "summary": "1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "external", "summary": "1610958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610958" }, { "category": "external", "summary": "1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3540.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-02T08:10:19+00:00", "generator": { "date": "2025-08-02T08:10:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:3540", "initial_release_date": "2018-11-13T16:36:35+00:00", "revision_history": [ { "date": "2018-11-13T16:36:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-11-13T16:36:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:10:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-693.43.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-693.43.1.el7.s390x", "product": { "name": "kernel-0:3.10.0-693.43.1.el7.s390x", "product_id": "kernel-0:3.10.0-693.43.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.43.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-693.43.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.43.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.43.1.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-693.43.1.el7.s390x", "product_id": "kernel-debug-0:3.10.0-693.43.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.43.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.43.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.43.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.43.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.43.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-693.43.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-693.43.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.43.1.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-693.43.1.el7.s390x", "product_id": "kernel-devel-0:3.10.0-693.43.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.43.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.43.1.el7.s390x", "product": { "name": "perf-0:3.10.0-693.43.1.el7.s390x", "product_id": "perf-0:3.10.0-693.43.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.43.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.43.1.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-693.43.1.el7.s390x", "product_id": "kernel-headers-0:3.10.0-693.43.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.43.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.43.1.el7.s390x", "product": { "name": "python-perf-0:3.10.0-693.43.1.el7.s390x", "product_id": "python-perf-0:3.10.0-693.43.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.43.1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.43.1.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-693.43.1.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-693.43.1.el7.noarch", "product_id": "kernel-doc-0:3.10.0-693.43.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.43.1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.43.1.el7.x86_64", "product": { "name": "kernel-0:3.10.0-693.43.1.el7.x86_64", "product_id": "kernel-0:3.10.0-693.43.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.43.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.43.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.43.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.43.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.43.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.43.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.43.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.43.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.43.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.43.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.43.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.43.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.43.1.el7.x86_64", "product": { "name": "perf-0:3.10.0-693.43.1.el7.x86_64", "product_id": "perf-0:3.10.0-693.43.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.43.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.43.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.43.1.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-693.43.1.el7.x86_64", "product_id": "python-perf-0:3.10.0-693.43.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.43.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.43.1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.43.1.el7.src", "product": { "name": "kernel-0:3.10.0-693.43.1.el7.src", "product_id": "kernel-0:3.10.0-693.43.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.43.1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.43.1.el7.ppc64", "product": { "name": "kernel-0:3.10.0-693.43.1.el7.ppc64", "product_id": "kernel-0:3.10.0-693.43.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.43.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.43.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.43.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.43.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.43.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.43.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.43.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.43.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.43.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.43.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.43.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.43.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.43.1.el7.ppc64", "product": { "name": "perf-0:3.10.0-693.43.1.el7.ppc64", "product_id": "perf-0:3.10.0-693.43.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.43.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-693.43.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.43.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.43.1.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-693.43.1.el7.ppc64", "product_id": "python-perf-0:3.10.0-693.43.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.43.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.43.1.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.43.1.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-693.43.1.el7.ppc64le", "product_id": "kernel-0:3.10.0-693.43.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.43.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.43.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.43.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.43.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.43.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.43.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.43.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.43.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.43.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.43.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.43.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-693.43.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.43.1.el7.ppc64le", "product": { "name": "perf-0:3.10.0-693.43.1.el7.ppc64le", "product_id": "perf-0:3.10.0-693.43.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.43.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.43.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.43.1.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-693.43.1.el7.ppc64le", "product_id": "python-perf-0:3.10.0-693.43.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.43.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.43.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.43.1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.43.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.43.1.el7.src", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.43.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.43.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.43.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.43.1.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.43.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.43.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.43.1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.43.1.el7.src", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.43.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.43.1.el7.noarch", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.43.1.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.43.1.el7.src", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.43.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.43.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18344", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2018-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1610958" } ], "notes": [ { "category": "description", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "RHBZ#1610958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610958" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-18344", "url": "https://www.cve.org/CVERecord?id=CVE-2017-18344" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18344", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18344" } ], "release_date": "2017-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-13T16:36:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:3540" }, { "category": "workaround", "details": "Attached to this bugzilla is a systemtap script that will prevent opening (and therefore reading) the /proc/\u003cprocess\u003e/timers file which is used to leak information.\n\nThe SystemTap script is relatively small and efficient, broken into 3 distinct sections as follows:\n\n--------\n\nprobe kernel.function(\"proc_timers_open@fs/proc/base.c\").return { \n // this is -EACCES\n\t$return = -13;\n message = sprintf(\"CVE-2017-18344 mitigation denied access to %s to %s(%d)\", file_name , execname(), pid());\n // print a warning message at KERN_INFO debug level\n printk(6, message);\n}\n\nprobe begin {\n printk(6, \"Mitigation for CVE-2017-18344 loaded.\\n\");\n}\n\n\nprobe end {\n printk(6, \"Mitigation for CVE-2017-18344 unloaded.\\n\");\n}\n\n\n---------\n\nFirst, the script places a probe at the return of the kernel function \u201cproc_timers_open\u201d when called. This modifies the return value to be EACCES which would return this value to userspace preventing this file from being opened. When the /proc/\u003cpid\u003e/timer file is attempted to be opened, a message will be logged to the kernel log subsystem showing the process and pid of the application attempting to access the timer file. \n\nThis file is not in widespread use at this time, although some applications may read from it to debug or understand their own timers that are set. This mitigation will not be useful in this context.\n\nFinally, the \u201cprobe begin\u201d and \u201cprobe end\u201d code blocks tell systemtap to add the supplied text to the kernel log buffer via the printk function. This creates an audit trail by registering in the system logs exactly when the mitigation is loaded and unloaded. This will need to be compiled with guru mode (-g parameter) to compile.\n\nThis will need to be loaded at each boot to remain effective. Red Hat Product security recommends updating to a patched kernel when it is available.\n\nRed Hat always seeks to provide both mitigations to disable attacks as well as the actual patches to treat the flaw. To learn more about SystemTap, and how it can be used in your management of your Red Hat systems, please refer to Using SystemTap[1] or one of our videos about it within our Customer Portal[2].\n\n1 - https://access.redhat.com/articles/17839\n2 - https://access.redhat.com/search/#/?q=systemtap", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5391", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1609664" } ], "notes": [ { "category": "description", "text": "A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "RHBZ#1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5391", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5391" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/641765", "url": "https://www.kb.cert.org/vuls/id/641765" } ], "release_date": "2018-08-14T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-13T16:36:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:3540" }, { "category": "workaround", "details": "One may change the default 4MB and 3MB values of net.ipv4.ipfrag_high_thresh and net.ipv4.ipfrag_low_thresh (and their ipv6 counterparts net.ipv6.ipfrag_high_thresh and net.ipv6.ipfrag_low_thresh) to 256 kB and 192 kB (respectively) or below. Tests show some to significant CPU saturation drop during an attack, depending on a hardware, configuration and environment.\n\nThere can be some impact on performance though, due to ipfrag_high_thresh of 262144 bytes, as only two 64K fragments can fit in the reassembly queue at the same time. For example, there is a risk of breaking applications that rely on large UDP packets.\n\nSee the Mitigation section in the https://access.redhat.com/articles/3553061 article for the script to quickly change to/from default and lower settings.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)" }, { "cve": "CVE-2018-10675", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1575065" } ], "notes": [ { "category": "description", "text": "The do_get_mempolicy() function in mm/mempolicy.c in the Linux kernel allows local users to hit a use-after-free bug via crafted system calls and thus cause a denial of service (DoS) or possibly have unspecified other impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10675" }, { "category": "external", "summary": "RHBZ#1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10675", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675" } ], "release_date": "2017-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-13T16:36:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:3540" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact" }, { "acknowledgments": [ { "names": [ "Qualys Research Labs" ] } ], "cve": "CVE-2018-14634", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2018-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1624498" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in Linux\u0027s create_elf_tables function", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect 32-bit systems as they do not have a large enough address space to exploit this flaw.\n\nSystems with less than 32GB of memory are very unlikely to be affected by this issue due to memory demands during exploitation.\n\nThis issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the version of the kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 will address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14634" }, { "category": "external", "summary": "RHBZ#1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14634", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14634" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy", "url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2018/09/25/4", "url": "https://www.openwall.com/lists/oss-security/2018/09/25/4" } ], "release_date": "2018-09-25T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-13T16:36:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:3540" }, { "category": "workaround", "details": "To mitigate the issue:\n\nEnable and install kernel-debuginfo packages as per https://access.redhat.com/solutions/666123\n\n1) On the host, save the following in a file with the \".stp\" extension:\n\n// CVE-2018-14634\n//\n// Theory of operations: adjust the thread\u0027s # rlimit-in-effect around\n// calls to the vulnerable get_arg_page() function so as to encompass\n// the newly required _STK_LIM / 4 * 3 maximum.\n\n// Complication: the rlimit is stored in a current-\u003e structure that\n// is shared across the threads of the process. They may concurrently\n// invoke this operation.\n\nfunction clamp_stack_rlim_cur:long ()\n%{\n struct rlimit *rlim = current-\u003esignal-\u003erlim;\n unsigned long rlim_cur = READ_ONCE(rlim[RLIMIT_STACK].rlim_cur);\n\n unsigned long limit = _STK_LIM / 4 * 3;\n limit *= 4; // multiply it back up, to the scale used by rlim_cur\n\n if (rlim_cur \u003e limit) {\n WRITE_ONCE(rlim[RLIMIT_STACK].rlim_cur, limit);\n STAP_RETURN(limit);\n } else\n STAP_RETURN(0);\n%}\n\nprobe kernel.function(\"copy_strings\").call\n{\n l = clamp_stack_rlim_cur()\n if (l)\n printf(\"lowered process %s(%d) STACK rlim_cur to %p\\n\",\n execname(), pid(), l)\n}\n\nprobe begin {\n\tprintf(\"CVE-2018-14634 mitigation loaded\\n\")\n\n}\n\nprobe end {\n\tprintf(\"CVE-2018-14634 mitigation unloaded\\n\")\n}\n\n2) Install the \"systemtap\" package and any required dependencies. Refer\nto the \"2. Using SystemTap\" chapter in the Red Hat Enterprise Linux\n\"SystemTap Beginners Guide\" document, available from docs.redhat.com,\nfor information on installing the required -debuginfo and matching kernel-devel packages\n\n3) Run the \"stap -g [filename-from-step-1].stp\" command as root.\n\nIf the host is rebooted, the changes will be lost and the script must be\nrun again.\n\n\nAlternatively, build the systemtap script on a development system with\n\"stap -g -p 4 [filename-from-step-1].stp\", distribute the resulting\nkernel module to all affected systems, and run \"staprun -L \u003cmodule\u003e\" on those.\nWhen using this approach only systemtap-runtime package is required on\nthe affected systems. Please notice that the kernel version must be the same\nacross all systems.\n\n\nThis may not be a suitable workaround if your application uses massive amounts of stack space. Please consider this if there are any adverse affects when running this mitigation.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.43.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.43.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.43.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Integer overflow in Linux\u0027s create_elf_tables function" } ] }
rhsa-2018:3591
Vulnerability from csaf_redhat
Published
2018-11-13 17:54
Modified
2025-08-02 08:10
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c (CVE-2017-18344)
* kernel: Integer overflow in Linux's create_elf_tables function (CVE-2018-14634)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Qualys Research Labs for reporting CVE-2018-14634.
Bug Fix(es):
* On systems running Red Hat Enterprise Linux 7.3 with Red Hat OpenShift Container Platform 3.5, a node sometimes got into "NodeNotReady" state after a CPU softlockup. Consequently, the node was not available. This update fixes some scheduling latency sources in memory compaction and in the inodes memory reclaim. As a result, nodes no longer get into "NodeNotReady" state under the described circumstances. (BZ#1625866)
* Previously, a kernel panic occurred when the kernel tried to make an out of bound access to the array that describes the L1 Terminal Fault (L1TF) mitigation state on systems without Extended Page Tables (EPT) support. This update extends the array of mitigation states to cover all the states, which effectively prevents out of bound array access. Also, this update enables rejecting invalid, irrelevant values, that might be erroneously provided by the userspace. As a result, the kernel no longer panics in the described scenario. (BZ#1629566)
* Previously, a packet was missing the User Datagram Protocol (UDP) payload checksum during a full checksum computation, if the hardware checksum was not applied. As a consequence, a packet with an incorrect checksum was dropped by a peer. With this update, the kernel includes the UDP payload checksum during the full checksum computation. As a result, the checksum is computed correctly and the packet can be received by the peer. (BZ#1635794)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c (CVE-2017-18344)\n\n* kernel: Integer overflow in Linux\u0027s create_elf_tables function (CVE-2018-14634)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Qualys Research Labs for reporting CVE-2018-14634.\n\nBug Fix(es):\n\n* On systems running Red Hat Enterprise Linux 7.3 with Red Hat OpenShift Container Platform 3.5, a node sometimes got into \"NodeNotReady\" state after a CPU softlockup. Consequently, the node was not available. This update fixes some scheduling latency sources in memory compaction and in the inodes memory reclaim. As a result, nodes no longer get into \"NodeNotReady\" state under the described circumstances. (BZ#1625866)\n\n* Previously, a kernel panic occurred when the kernel tried to make an out of bound access to the array that describes the L1 Terminal Fault (L1TF) mitigation state on systems without Extended Page Tables (EPT) support. This update extends the array of mitigation states to cover all the states, which effectively prevents out of bound array access. Also, this update enables rejecting invalid, irrelevant values, that might be erroneously provided by the userspace. As a result, the kernel no longer panics in the described scenario. (BZ#1629566)\n\n* Previously, a packet was missing the User Datagram Protocol (UDP) payload checksum during a full checksum computation, if the hardware checksum was not applied. As a consequence, a packet with an incorrect checksum was dropped by a peer. With this update, the kernel includes the UDP payload checksum during the full checksum computation. As a result, the checksum is computed correctly and the packet can be received by the peer. (BZ#1635794)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:3591", "url": "https://access.redhat.com/errata/RHSA-2018:3591" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy", "url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy" }, { "category": "external", "summary": "1610958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610958" }, { "category": "external", "summary": "1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3591.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T08:10:36+00:00", "generator": { "date": "2025-08-02T08:10:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:3591", "initial_release_date": "2018-11-13T17:54:17+00:00", "revision_history": [ { "date": "2018-11-13T17:54:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-11-13T17:54:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:10:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.61.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.61.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.61.1.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-514.61.1.el7.x86_64", "product_id": "python-perf-0:3.10.0-514.61.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.61.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.61.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.61.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.61.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.61.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.61.1.el7.x86_64", "product": { "name": "kernel-0:3.10.0-514.61.1.el7.x86_64", "product_id": "kernel-0:3.10.0-514.61.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.61.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.61.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.61.1.el7.x86_64", "product": { "name": "perf-0:3.10.0-514.61.1.el7.x86_64", "product_id": "perf-0:3.10.0-514.61.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.61.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.61.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.61.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.61.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.61.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.61.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.61.1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:3.10.0-514.61.1.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-514.61.1.el7.noarch", "product_id": "kernel-doc-0:3.10.0-514.61.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.61.1.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.61.1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-514.61.1.el7.src", "product": { "name": "kernel-0:3.10.0-514.61.1.el7.src", "product_id": "kernel-0:3.10.0-514.61.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.61.1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.61.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-514.61.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.61.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.61.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.61.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.61.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.61.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.61.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.61.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.61.1.el7.ppc64le", "product": { "name": "perf-0:3.10.0-514.61.1.el7.ppc64le", "product_id": "perf-0:3.10.0-514.61.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.61.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.61.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.61.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.61.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.61.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.61.1.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-514.61.1.el7.ppc64le", "product_id": "python-perf-0:3.10.0-514.61.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.61.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.61.1.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-514.61.1.el7.ppc64le", "product_id": "kernel-0:3.10.0-514.61.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.61.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.61.1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.61.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.61.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.61.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.61.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.61.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.61.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-514.61.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.61.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.61.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.61.1.el7.ppc64", "product": { "name": "perf-0:3.10.0-514.61.1.el7.ppc64", "product_id": "perf-0:3.10.0-514.61.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.61.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.61.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.61.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.61.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.61.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.61.1.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-514.61.1.el7.ppc64", "product_id": "python-perf-0:3.10.0-514.61.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.61.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.61.1.el7.ppc64", "product": { "name": "kernel-0:3.10.0-514.61.1.el7.ppc64", "product_id": "kernel-0:3.10.0-514.61.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.61.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.61.1.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.61.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.61.1.el7.s390x", "product": { "name": "perf-0:3.10.0-514.61.1.el7.s390x", "product_id": "perf-0:3.10.0-514.61.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.61.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.61.1.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-514.61.1.el7.s390x", "product_id": "kernel-headers-0:3.10.0-514.61.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.61.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-514.61.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.61.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.61.1.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-514.61.1.el7.s390x", "product_id": "kernel-devel-0:3.10.0-514.61.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.61.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.61.1.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-514.61.1.el7.s390x", "product_id": "kernel-debug-0:3.10.0-514.61.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.61.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-514.61.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.61.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.61.1.el7.s390x", "product": { "name": "python-perf-0:3.10.0-514.61.1.el7.s390x", "product_id": "python-perf-0:3.10.0-514.61.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.61.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.61.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-514.61.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.61.1.el7.s390x", "product": { "name": "kernel-0:3.10.0-514.61.1.el7.s390x", "product_id": "kernel-0:3.10.0-514.61.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.61.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.61.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-514.61.1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.61.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.61.1.el7.src", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.61.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.61.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.61.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.61.1.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.61.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.61.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.61.1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.61.1.el7.src", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.61.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.61.1.el7.noarch", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.61.1.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.61.1.el7.src", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.61.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.61.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18344", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2018-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1610958" } ], "notes": [ { "category": "description", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "RHBZ#1610958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610958" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-18344", "url": "https://www.cve.org/CVERecord?id=CVE-2017-18344" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18344", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18344" } ], "release_date": "2017-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-13T17:54:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:3591" }, { "category": "workaround", "details": "Attached to this bugzilla is a systemtap script that will prevent opening (and therefore reading) the /proc/\u003cprocess\u003e/timers file which is used to leak information.\n\nThe SystemTap script is relatively small and efficient, broken into 3 distinct sections as follows:\n\n--------\n\nprobe kernel.function(\"proc_timers_open@fs/proc/base.c\").return { \n // this is -EACCES\n\t$return = -13;\n message = sprintf(\"CVE-2017-18344 mitigation denied access to %s to %s(%d)\", file_name , execname(), pid());\n // print a warning message at KERN_INFO debug level\n printk(6, message);\n}\n\nprobe begin {\n printk(6, \"Mitigation for CVE-2017-18344 loaded.\\n\");\n}\n\n\nprobe end {\n printk(6, \"Mitigation for CVE-2017-18344 unloaded.\\n\");\n}\n\n\n---------\n\nFirst, the script places a probe at the return of the kernel function \u201cproc_timers_open\u201d when called. This modifies the return value to be EACCES which would return this value to userspace preventing this file from being opened. When the /proc/\u003cpid\u003e/timer file is attempted to be opened, a message will be logged to the kernel log subsystem showing the process and pid of the application attempting to access the timer file. \n\nThis file is not in widespread use at this time, although some applications may read from it to debug or understand their own timers that are set. This mitigation will not be useful in this context.\n\nFinally, the \u201cprobe begin\u201d and \u201cprobe end\u201d code blocks tell systemtap to add the supplied text to the kernel log buffer via the printk function. This creates an audit trail by registering in the system logs exactly when the mitigation is loaded and unloaded. This will need to be compiled with guru mode (-g parameter) to compile.\n\nThis will need to be loaded at each boot to remain effective. Red Hat Product security recommends updating to a patched kernel when it is available.\n\nRed Hat always seeks to provide both mitigations to disable attacks as well as the actual patches to treat the flaw. To learn more about SystemTap, and how it can be used in your management of your Red Hat systems, please refer to Using SystemTap[1] or one of our videos about it within our Customer Portal[2].\n\n1 - https://access.redhat.com/articles/17839\n2 - https://access.redhat.com/search/#/?q=systemtap", "product_ids": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c" }, { "acknowledgments": [ { "names": [ "Qualys Research Labs" ] } ], "cve": "CVE-2018-14634", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2018-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1624498" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in Linux\u0027s create_elf_tables function", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect 32-bit systems as they do not have a large enough address space to exploit this flaw.\n\nSystems with less than 32GB of memory are very unlikely to be affected by this issue due to memory demands during exploitation.\n\nThis issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the version of the kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 will address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14634" }, { "category": "external", "summary": "RHBZ#1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14634", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14634" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy", "url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2018/09/25/4", "url": "https://www.openwall.com/lists/oss-security/2018/09/25/4" } ], "release_date": "2018-09-25T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-13T17:54:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:3591" }, { "category": "workaround", "details": "To mitigate the issue:\n\nEnable and install kernel-debuginfo packages as per https://access.redhat.com/solutions/666123\n\n1) On the host, save the following in a file with the \".stp\" extension:\n\n// CVE-2018-14634\n//\n// Theory of operations: adjust the thread\u0027s # rlimit-in-effect around\n// calls to the vulnerable get_arg_page() function so as to encompass\n// the newly required _STK_LIM / 4 * 3 maximum.\n\n// Complication: the rlimit is stored in a current-\u003e structure that\n// is shared across the threads of the process. They may concurrently\n// invoke this operation.\n\nfunction clamp_stack_rlim_cur:long ()\n%{\n struct rlimit *rlim = current-\u003esignal-\u003erlim;\n unsigned long rlim_cur = READ_ONCE(rlim[RLIMIT_STACK].rlim_cur);\n\n unsigned long limit = _STK_LIM / 4 * 3;\n limit *= 4; // multiply it back up, to the scale used by rlim_cur\n\n if (rlim_cur \u003e limit) {\n WRITE_ONCE(rlim[RLIMIT_STACK].rlim_cur, limit);\n STAP_RETURN(limit);\n } else\n STAP_RETURN(0);\n%}\n\nprobe kernel.function(\"copy_strings\").call\n{\n l = clamp_stack_rlim_cur()\n if (l)\n printf(\"lowered process %s(%d) STACK rlim_cur to %p\\n\",\n execname(), pid(), l)\n}\n\nprobe begin {\n\tprintf(\"CVE-2018-14634 mitigation loaded\\n\")\n\n}\n\nprobe end {\n\tprintf(\"CVE-2018-14634 mitigation unloaded\\n\")\n}\n\n2) Install the \"systemtap\" package and any required dependencies. Refer\nto the \"2. Using SystemTap\" chapter in the Red Hat Enterprise Linux\n\"SystemTap Beginners Guide\" document, available from docs.redhat.com,\nfor information on installing the required -debuginfo and matching kernel-devel packages\n\n3) Run the \"stap -g [filename-from-step-1].stp\" command as root.\n\nIf the host is rebooted, the changes will be lost and the script must be\nrun again.\n\n\nAlternatively, build the systemtap script on a development system with\n\"stap -g -p 4 [filename-from-step-1].stp\", distribute the resulting\nkernel module to all affected systems, and run \"staprun -L \u003cmodule\u003e\" on those.\nWhen using this approach only systemtap-runtime package is required on\nthe affected systems. Please notice that the kernel version must be the same\nacross all systems.\n\n\nThis may not be a suitable workaround if your application uses massive amounts of stack space. Please consider this if there are any adverse affects when running this mitigation.", "product_ids": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.61.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.61.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.61.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.61.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Integer overflow in Linux\u0027s create_elf_tables function" } ] }
rhsa-2018:3586
Vulnerability from csaf_redhat
Published
2018-11-13 16:31
Modified
2025-08-02 08:10
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise MRG 2.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)
* kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c (CVE-2017-18344)
* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)
* kernel: Integer overflow in Linux's create_elf_tables function (CVE-2018-14634)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5391 and Qualys Research Labs for reporting CVE-2018-14634.
Bug Fix(es):
* The kernel-rt packages have been upgraded to the 3.10.0-693.43.1 source tree, which provides a number of bug fixes over the previous version. (BZ#1632422)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise MRG 2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)\n\n* kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c (CVE-2017-18344)\n\n* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)\n\n* kernel: Integer overflow in Linux\u0027s create_elf_tables function (CVE-2018-14634)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5391 and Qualys Research Labs for reporting CVE-2018-14634.\n\nBug Fix(es):\n\n* The kernel-rt packages have been upgraded to the 3.10.0-693.43.1 source tree, which provides a number of bug fixes over the previous version. (BZ#1632422)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:3586", "url": "https://access.redhat.com/errata/RHSA-2018:3586" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy", "url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy" }, { "category": "external", "summary": "1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "external", "summary": "1610958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610958" }, { "category": "external", "summary": "1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3586.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-02T08:10:26+00:00", "generator": { "date": "2025-08-02T08:10:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:3586", "initial_release_date": "2018-11-13T16:31:07+00:00", "revision_history": [ { "date": "2018-11-13T16:31:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-11-13T16:31:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:10:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-6" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debug-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product": { "name": "kernel-rt-debug-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_id": "kernel-rt-debug-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-693.43.1.rt56.630.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product": { "name": "kernel-rt-debug-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_id": "kernel-rt-debug-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-693.43.1.rt56.630.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-693.43.1.rt56.630.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product": { "name": "kernel-rt-trace-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_id": "kernel-rt-trace-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-693.43.1.rt56.630.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product": { "name": "kernel-rt-trace-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_id": "kernel-rt-trace-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-693.43.1.rt56.630.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-693.43.1.rt56.630.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_id": "kernel-rt-vanilla-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-693.43.1.rt56.630.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_id": "kernel-rt-vanilla-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-693.43.1.rt56.630.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product": { "name": "kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_id": "kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.43.1.rt56.630.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-693.43.1.rt56.630.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-693.43.1.rt56.630.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-693.43.1.rt56.630.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product": { "name": "kernel-rt-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_id": "kernel-rt-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-693.43.1.rt56.630.el6rt?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.src", "product": { "name": "kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.src", "product_id": "kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.43.1.rt56.630.el6rt?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-firmware-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "product": { "name": "kernel-rt-firmware-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "product_id": "kernel-rt-firmware-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-693.43.1.rt56.630.el6rt?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-doc-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "product": { "name": "kernel-rt-doc-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "product_id": "kernel-rt-doc-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-693.43.1.rt56.630.el6rt?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.src" }, "product_reference": "kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.src", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" }, "product_reference": "kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" }, "product_reference": "kernel-rt-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-1:3.10.0-693.43.1.rt56.630.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.43.1.rt56.630.el6rt.noarch" }, "product_reference": "kernel-rt-doc-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-firmware-1:3.10.0-693.43.1.rt56.630.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.43.1.rt56.630.el6rt.noarch" }, "product_reference": "kernel-rt-firmware-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18344", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2018-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1610958" } ], "notes": [ { "category": "description", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "RHBZ#1610958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610958" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-18344", "url": "https://www.cve.org/CVERecord?id=CVE-2017-18344" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18344", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18344" } ], "release_date": "2017-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-13T16:31:07+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3586" }, { "category": "workaround", "details": "Attached to this bugzilla is a systemtap script that will prevent opening (and therefore reading) the /proc/\u003cprocess\u003e/timers file which is used to leak information.\n\nThe SystemTap script is relatively small and efficient, broken into 3 distinct sections as follows:\n\n--------\n\nprobe kernel.function(\"proc_timers_open@fs/proc/base.c\").return { \n // this is -EACCES\n\t$return = -13;\n message = sprintf(\"CVE-2017-18344 mitigation denied access to %s to %s(%d)\", file_name , execname(), pid());\n // print a warning message at KERN_INFO debug level\n printk(6, message);\n}\n\nprobe begin {\n printk(6, \"Mitigation for CVE-2017-18344 loaded.\\n\");\n}\n\n\nprobe end {\n printk(6, \"Mitigation for CVE-2017-18344 unloaded.\\n\");\n}\n\n\n---------\n\nFirst, the script places a probe at the return of the kernel function \u201cproc_timers_open\u201d when called. This modifies the return value to be EACCES which would return this value to userspace preventing this file from being opened. When the /proc/\u003cpid\u003e/timer file is attempted to be opened, a message will be logged to the kernel log subsystem showing the process and pid of the application attempting to access the timer file. \n\nThis file is not in widespread use at this time, although some applications may read from it to debug or understand their own timers that are set. This mitigation will not be useful in this context.\n\nFinally, the \u201cprobe begin\u201d and \u201cprobe end\u201d code blocks tell systemtap to add the supplied text to the kernel log buffer via the printk function. This creates an audit trail by registering in the system logs exactly when the mitigation is loaded and unloaded. This will need to be compiled with guru mode (-g parameter) to compile.\n\nThis will need to be loaded at each boot to remain effective. Red Hat Product security recommends updating to a patched kernel when it is available.\n\nRed Hat always seeks to provide both mitigations to disable attacks as well as the actual patches to treat the flaw. To learn more about SystemTap, and how it can be used in your management of your Red Hat systems, please refer to Using SystemTap[1] or one of our videos about it within our Customer Portal[2].\n\n1 - https://access.redhat.com/articles/17839\n2 - https://access.redhat.com/search/#/?q=systemtap", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5391", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1609664" } ], "notes": [ { "category": "description", "text": "A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "RHBZ#1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5391", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5391" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/641765", "url": "https://www.kb.cert.org/vuls/id/641765" } ], "release_date": "2018-08-14T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-13T16:31:07+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3586" }, { "category": "workaround", "details": "One may change the default 4MB and 3MB values of net.ipv4.ipfrag_high_thresh and net.ipv4.ipfrag_low_thresh (and their ipv6 counterparts net.ipv6.ipfrag_high_thresh and net.ipv6.ipfrag_low_thresh) to 256 kB and 192 kB (respectively) or below. Tests show some to significant CPU saturation drop during an attack, depending on a hardware, configuration and environment.\n\nThere can be some impact on performance though, due to ipfrag_high_thresh of 262144 bytes, as only two 64K fragments can fit in the reassembly queue at the same time. For example, there is a risk of breaking applications that rely on large UDP packets.\n\nSee the Mitigation section in the https://access.redhat.com/articles/3553061 article for the script to quickly change to/from default and lower settings.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)" }, { "cve": "CVE-2018-10675", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1575065" } ], "notes": [ { "category": "description", "text": "The do_get_mempolicy() function in mm/mempolicy.c in the Linux kernel allows local users to hit a use-after-free bug via crafted system calls and thus cause a denial of service (DoS) or possibly have unspecified other impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10675" }, { "category": "external", "summary": "RHBZ#1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10675", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675" } ], "release_date": "2017-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-13T16:31:07+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3586" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact" }, { "acknowledgments": [ { "names": [ "Qualys Research Labs" ] } ], "cve": "CVE-2018-14634", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2018-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1624498" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in Linux\u0027s create_elf_tables function", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect 32-bit systems as they do not have a large enough address space to exploit this flaw.\n\nSystems with less than 32GB of memory are very unlikely to be affected by this issue due to memory demands during exploitation.\n\nThis issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the version of the kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 will address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14634" }, { "category": "external", "summary": "RHBZ#1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14634", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14634" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy", "url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2018/09/25/4", "url": "https://www.openwall.com/lists/oss-security/2018/09/25/4" } ], "release_date": "2018-09-25T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-13T16:31:07+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3586" }, { "category": "workaround", "details": "To mitigate the issue:\n\nEnable and install kernel-debuginfo packages as per https://access.redhat.com/solutions/666123\n\n1) On the host, save the following in a file with the \".stp\" extension:\n\n// CVE-2018-14634\n//\n// Theory of operations: adjust the thread\u0027s # rlimit-in-effect around\n// calls to the vulnerable get_arg_page() function so as to encompass\n// the newly required _STK_LIM / 4 * 3 maximum.\n\n// Complication: the rlimit is stored in a current-\u003e structure that\n// is shared across the threads of the process. They may concurrently\n// invoke this operation.\n\nfunction clamp_stack_rlim_cur:long ()\n%{\n struct rlimit *rlim = current-\u003esignal-\u003erlim;\n unsigned long rlim_cur = READ_ONCE(rlim[RLIMIT_STACK].rlim_cur);\n\n unsigned long limit = _STK_LIM / 4 * 3;\n limit *= 4; // multiply it back up, to the scale used by rlim_cur\n\n if (rlim_cur \u003e limit) {\n WRITE_ONCE(rlim[RLIMIT_STACK].rlim_cur, limit);\n STAP_RETURN(limit);\n } else\n STAP_RETURN(0);\n%}\n\nprobe kernel.function(\"copy_strings\").call\n{\n l = clamp_stack_rlim_cur()\n if (l)\n printf(\"lowered process %s(%d) STACK rlim_cur to %p\\n\",\n execname(), pid(), l)\n}\n\nprobe begin {\n\tprintf(\"CVE-2018-14634 mitigation loaded\\n\")\n\n}\n\nprobe end {\n\tprintf(\"CVE-2018-14634 mitigation unloaded\\n\")\n}\n\n2) Install the \"systemtap\" package and any required dependencies. Refer\nto the \"2. Using SystemTap\" chapter in the Red Hat Enterprise Linux\n\"SystemTap Beginners Guide\" document, available from docs.redhat.com,\nfor information on installing the required -debuginfo and matching kernel-devel packages\n\n3) Run the \"stap -g [filename-from-step-1].stp\" command as root.\n\nIf the host is rebooted, the changes will be lost and the script must be\nrun again.\n\n\nAlternatively, build the systemtap script on a development system with\n\"stap -g -p 4 [filename-from-step-1].stp\", distribute the resulting\nkernel module to all affected systems, and run \"staprun -L \u003cmodule\u003e\" on those.\nWhen using this approach only systemtap-runtime package is required on\nthe affected systems. Please notice that the kernel version must be the same\nacross all systems.\n\n\nThis may not be a suitable workaround if your application uses massive amounts of stack space. Please consider this if there are any adverse affects when running this mitigation.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.43.1.rt56.630.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.43.1.rt56.630.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Integer overflow in Linux\u0027s create_elf_tables function" } ] }
rhsa-2018:2925
Vulnerability from csaf_redhat
Published
2018-10-17 00:04
Modified
2025-08-02 08:10
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)
* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)
* kernel: Integer overflow in Linux's create_elf_tables function (CVE-2018-14634)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5391 and Qualys Research Labs for reporting CVE-2018-14634.
Bug Fix(es):
* Previously, the kernel source code lacked support to report the Speculative Store Bypass Disable (SSBD) vulnerability status on IBM Power Systems. As a consequence, the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file incorrectly reported "Not affected". This fix updates the kernel source code to properly report the SSBD status either as "Vulnerable" or "Mitigation: Kernel entry/exit barrier (TYPE)", where TYPE is one of "eieio", "hwsync", "fallback", or "unknown". (BZ#1615873)
* After updating the system to prevent the L1 Terminal Fault (L1TF) vulnerability, only one thread was detected on systems that offer processing of two threads on a single processor core. With this update, the "__max_smt_threads()" function has been fixed. As a result, both threads are now detected correctly in the described situation. (BZ#1625335)
* Previously, a kernel panic occurred when the kernel tried to make an out of bound access to the array that describes the L1 Terminal Fault (L1TF) mitigation state on systems without Extended Page Tables (EPT) support. This update extends the array of mitigation states to cover all the states, which effectively prevents out of bound array access. Also, this update enables rejecting invalid, irrelevant values, that might be erroneously provided by the userspace. As a result, the kernel no longer panics in the described scenario. (BZ#1629634)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)\n\n* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)\n\n* kernel: Integer overflow in Linux\u0027s create_elf_tables function (CVE-2018-14634)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5391 and Qualys Research Labs for reporting CVE-2018-14634.\n\nBug Fix(es):\n\n* Previously, the kernel source code lacked support to report the Speculative Store Bypass Disable (SSBD) vulnerability status on IBM Power Systems. As a consequence, the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file incorrectly reported \"Not affected\". This fix updates the kernel source code to properly report the SSBD status either as \"Vulnerable\" or \"Mitigation: Kernel entry/exit barrier (TYPE)\", where TYPE is one of \"eieio\", \"hwsync\", \"fallback\", or \"unknown\". (BZ#1615873)\n\n* After updating the system to prevent the L1 Terminal Fault (L1TF) vulnerability, only one thread was detected on systems that offer processing of two threads on a single processor core. With this update, the \"__max_smt_threads()\" function has been fixed. As a result, both threads are now detected correctly in the described situation. (BZ#1625335)\n\n* Previously, a kernel panic occurred when the kernel tried to make an out of bound access to the array that describes the L1 Terminal Fault (L1TF) mitigation state on systems without Extended Page Tables (EPT) support. This update extends the array of mitigation states to cover all the states, which effectively prevents out of bound array access. Also, this update enables rejecting invalid, irrelevant values, that might be erroneously provided by the userspace. As a result, the kernel no longer panics in the described scenario. (BZ#1629634)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2925", "url": "https://access.redhat.com/errata/RHSA-2018:2925" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy", "url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy" }, { "category": "external", "summary": "1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "external", "summary": "1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2925.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T08:10:34+00:00", "generator": { "date": "2025-08-02T08:10:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2925", "initial_release_date": "2018-10-17T00:04:52+00:00", "revision_history": [ { "date": "2018-10-17T00:04:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-10-17T00:04:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:10:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.65.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-573.65.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.65.2.el6.x86_64", "product": { "name": "perf-0:2.6.32-573.65.2.el6.x86_64", "product_id": "perf-0:2.6.32-573.65.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.65.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.65.2.el6.x86_64", "product": { "name": "kernel-0:2.6.32-573.65.2.el6.x86_64", "product_id": "kernel-0:2.6.32-573.65.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.65.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.65.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.65.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.65.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.65.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.65.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.65.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.65.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.65.2.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-573.65.2.el6.x86_64", "product_id": "python-perf-0:2.6.32-573.65.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.65.2.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.65.2.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.65.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.65.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-573.65.2.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.65.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.65.2.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.65.2.el6.i686", "product": { "name": "python-perf-0:2.6.32-573.65.2.el6.i686", "product_id": "python-perf-0:2.6.32-573.65.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.65.2.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.65.2.el6.i686", "product": { "name": "perf-0:2.6.32-573.65.2.el6.i686", "product_id": "perf-0:2.6.32-573.65.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.65.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.65.2.el6.i686", "product": { "name": "kernel-0:2.6.32-573.65.2.el6.i686", "product_id": "kernel-0:2.6.32-573.65.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.65.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.65.2.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-573.65.2.el6.i686", "product_id": "kernel-headers-0:2.6.32-573.65.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.65.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.65.2.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-573.65.2.el6.i686", "product_id": "kernel-debug-0:2.6.32-573.65.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.65.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.65.2.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-573.65.2.el6.i686", "product_id": "kernel-devel-0:2.6.32-573.65.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.65.2.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.32-573.65.2.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-573.65.2.el6.noarch", "product_id": "kernel-doc-0:2.6.32-573.65.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-573.65.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-573.65.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-573.65.2.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-573.65.2.el6.src", "product": { "name": "kernel-0:2.6.32-573.65.2.el6.src", "product_id": "kernel-0:2.6.32-573.65.2.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.65.2.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-573.65.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.65.2.el6.s390x", "product": { "name": "python-perf-0:2.6.32-573.65.2.el6.s390x", "product_id": "python-perf-0:2.6.32-573.65.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.65.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-573.65.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.65.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.65.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.65.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.65.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.65.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.65.2.el6.s390x", "product": { "name": "perf-0:2.6.32-573.65.2.el6.s390x", "product_id": "perf-0:2.6.32-573.65.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.65.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.65.2.el6.s390x", "product": { "name": "kernel-0:2.6.32-573.65.2.el6.s390x", "product_id": "kernel-0:2.6.32-573.65.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.65.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-573.65.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.65.2.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-573.65.2.el6.s390x", "product_id": "kernel-headers-0:2.6.32-573.65.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.65.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.65.2.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-573.65.2.el6.s390x", "product_id": "kernel-debug-0:2.6.32-573.65.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.65.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-573.65.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.65.2.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-573.65.2.el6.s390x", "product_id": "kernel-devel-0:2.6.32-573.65.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.65.2.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:2.6.32-573.65.2.el6.ppc64", "product": { "name": "python-perf-0:2.6.32-573.65.2.el6.ppc64", "product_id": "python-perf-0:2.6.32-573.65.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.65.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "product_id": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.65.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.65.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-573.65.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.65.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.65.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.65.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.65.2.el6.ppc64", "product": { "name": "perf-0:2.6.32-573.65.2.el6.ppc64", "product_id": "perf-0:2.6.32-573.65.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.65.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-573.65.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.65.2.el6.ppc64", "product": { "name": "kernel-0:2.6.32-573.65.2.el6.ppc64", "product_id": "kernel-0:2.6.32-573.65.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.65.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.65.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.65.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.65.2.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.65.2.el6.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src" }, "product_reference": "kernel-0:2.6.32-573.65.2.el6.src", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.65.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.65.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.65.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "perf-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.65.2.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src" }, "product_reference": "kernel-0:2.6.32-573.65.2.el6.src", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.65.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.65.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.65.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "perf-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.65.2.el6.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src" }, "product_reference": "kernel-0:2.6.32-573.65.2.el6.src", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.65.2.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.65.2.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.65.2.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "perf-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.65.2.el6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src" }, "product_reference": "kernel-0:2.6.32-573.65.2.el6.src", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.65.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.65.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.65.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "perf-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5391", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1609664" } ], "notes": [ { "category": "description", "text": "A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "RHBZ#1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5391", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5391" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/641765", "url": "https://www.kb.cert.org/vuls/id/641765" } ], "release_date": "2018-08-14T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-17T00:04:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2925" }, { "category": "workaround", "details": "One may change the default 4MB and 3MB values of net.ipv4.ipfrag_high_thresh and net.ipv4.ipfrag_low_thresh (and their ipv6 counterparts net.ipv6.ipfrag_high_thresh and net.ipv6.ipfrag_low_thresh) to 256 kB and 192 kB (respectively) or below. Tests show some to significant CPU saturation drop during an attack, depending on a hardware, configuration and environment.\n\nThere can be some impact on performance though, due to ipfrag_high_thresh of 262144 bytes, as only two 64K fragments can fit in the reassembly queue at the same time. For example, there is a risk of breaking applications that rely on large UDP packets.\n\nSee the Mitigation section in the https://access.redhat.com/articles/3553061 article for the script to quickly change to/from default and lower settings.", "product_ids": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)" }, { "cve": "CVE-2018-10675", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1575065" } ], "notes": [ { "category": "description", "text": "The do_get_mempolicy() function in mm/mempolicy.c in the Linux kernel allows local users to hit a use-after-free bug via crafted system calls and thus cause a denial of service (DoS) or possibly have unspecified other impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10675" }, { "category": "external", "summary": "RHBZ#1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10675", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675" } ], "release_date": "2017-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-17T00:04:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact" }, { "acknowledgments": [ { "names": [ "Qualys Research Labs" ] } ], "cve": "CVE-2018-14634", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2018-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1624498" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in Linux\u0027s create_elf_tables function", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect 32-bit systems as they do not have a large enough address space to exploit this flaw.\n\nSystems with less than 32GB of memory are very unlikely to be affected by this issue due to memory demands during exploitation.\n\nThis issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the version of the kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 will address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14634" }, { "category": "external", "summary": "RHBZ#1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14634", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14634" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy", "url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2018/09/25/4", "url": "https://www.openwall.com/lists/oss-security/2018/09/25/4" } ], "release_date": "2018-09-25T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-17T00:04:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2925" }, { "category": "workaround", "details": "To mitigate the issue:\n\nEnable and install kernel-debuginfo packages as per https://access.redhat.com/solutions/666123\n\n1) On the host, save the following in a file with the \".stp\" extension:\n\n// CVE-2018-14634\n//\n// Theory of operations: adjust the thread\u0027s # rlimit-in-effect around\n// calls to the vulnerable get_arg_page() function so as to encompass\n// the newly required _STK_LIM / 4 * 3 maximum.\n\n// Complication: the rlimit is stored in a current-\u003e structure that\n// is shared across the threads of the process. They may concurrently\n// invoke this operation.\n\nfunction clamp_stack_rlim_cur:long ()\n%{\n struct rlimit *rlim = current-\u003esignal-\u003erlim;\n unsigned long rlim_cur = READ_ONCE(rlim[RLIMIT_STACK].rlim_cur);\n\n unsigned long limit = _STK_LIM / 4 * 3;\n limit *= 4; // multiply it back up, to the scale used by rlim_cur\n\n if (rlim_cur \u003e limit) {\n WRITE_ONCE(rlim[RLIMIT_STACK].rlim_cur, limit);\n STAP_RETURN(limit);\n } else\n STAP_RETURN(0);\n%}\n\nprobe kernel.function(\"copy_strings\").call\n{\n l = clamp_stack_rlim_cur()\n if (l)\n printf(\"lowered process %s(%d) STACK rlim_cur to %p\\n\",\n execname(), pid(), l)\n}\n\nprobe begin {\n\tprintf(\"CVE-2018-14634 mitigation loaded\\n\")\n\n}\n\nprobe end {\n\tprintf(\"CVE-2018-14634 mitigation unloaded\\n\")\n}\n\n2) Install the \"systemtap\" package and any required dependencies. Refer\nto the \"2. Using SystemTap\" chapter in the Red Hat Enterprise Linux\n\"SystemTap Beginners Guide\" document, available from docs.redhat.com,\nfor information on installing the required -debuginfo and matching kernel-devel packages\n\n3) Run the \"stap -g [filename-from-step-1].stp\" command as root.\n\nIf the host is rebooted, the changes will be lost and the script must be\nrun again.\n\n\nAlternatively, build the systemtap script on a development system with\n\"stap -g -p 4 [filename-from-step-1].stp\", distribute the resulting\nkernel module to all affected systems, and run \"staprun -L \u003cmodule\u003e\" on those.\nWhen using this approach only systemtap-runtime package is required on\nthe affected systems. Please notice that the kernel version must be the same\nacross all systems.\n\n\nThis may not be a suitable workaround if your application uses massive amounts of stack space. Please consider this if there are any adverse affects when running this mitigation.", "product_ids": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.65.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.65.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.65.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Integer overflow in Linux\u0027s create_elf_tables function" } ] }
rhsa-2018:2748
Vulnerability from csaf_redhat
Published
2018-09-25 19:22
Modified
2025-08-02 08:10
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Integer overflow in Linux's create_elf_tables function (CVE-2018-14634)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Qualys Research Labs for reporting this issue.
Bug Fix(es):
These updated kernel packages include also numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article:
https://access.redhat.com/articles/3588731
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Integer overflow in Linux\u0027s create_elf_tables function (CVE-2018-14634)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Qualys Research Labs for reporting this issue.\n\nBug Fix(es):\n\nThese updated kernel packages include also numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article:\n\nhttps://access.redhat.com/articles/3588731", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2748", "url": "https://access.redhat.com/errata/RHSA-2018:2748" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/3588731", "url": "https://access.redhat.com/articles/3588731" }, { "category": "external", "summary": "1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2748.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T08:10:04+00:00", "generator": { "date": "2025-08-02T08:10:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2748", "initial_release_date": "2018-09-25T19:22:06+00:00", "revision_history": [ { "date": "2018-09-25T19:22:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-09-25T19:22:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:10:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.14.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-862.14.4.el7.x86_64", "product": { "name": "perf-0:3.10.0-862.14.4.el7.x86_64", "product_id": "perf-0:3.10.0-862.14.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-862.14.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.14.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.14.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-862.14.4.el7.x86_64", "product": { "name": "kernel-0:3.10.0-862.14.4.el7.x86_64", "product_id": "kernel-0:3.10.0-862.14.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.14.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-862.14.4.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-862.14.4.el7.x86_64", "product_id": "python-perf-0:3.10.0-862.14.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-862.14.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.14.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.14.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.14.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-862.14.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.14.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.14.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.14.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.14.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.14.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.14.4.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-862.14.4.el7.src", "product": { "name": "kernel-0:3.10.0-862.14.4.el7.src", "product_id": "kernel-0:3.10.0-862.14.4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.14.4.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:3.10.0-862.14.4.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-862.14.4.el7.noarch", "product_id": "kernel-doc-0:3.10.0-862.14.4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-862.14.4.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-862.14.4.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.14.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.14.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-862.14.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-862.14.4.el7.s390x", "product": { "name": "perf-0:3.10.0-862.14.4.el7.s390x", "product_id": "perf-0:3.10.0-862.14.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-862.14.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.14.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-862.14.4.el7.s390x", "product": { "name": "python-perf-0:3.10.0-862.14.4.el7.s390x", "product_id": "python-perf-0:3.10.0-862.14.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-862.14.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.14.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-862.14.4.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.s390x", "product_id": "kernel-headers-0:3.10.0-862.14.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.14.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-862.14.4.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.s390x", "product_id": "kernel-devel-0:3.10.0-862.14.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.14.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-862.14.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.14.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-862.14.4.el7.s390x", "product": { "name": "kernel-0:3.10.0-862.14.4.el7.s390x", "product_id": "kernel-0:3.10.0-862.14.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.14.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-862.14.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-862.14.4.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.s390x", "product_id": "kernel-debug-0:3.10.0-862.14.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.14.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-862.14.4.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.14.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.14.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-862.14.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-862.14.4.el7.ppc64", "product": { "name": "perf-0:3.10.0-862.14.4.el7.ppc64", "product_id": "perf-0:3.10.0-862.14.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-862.14.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.14.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-862.14.4.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-862.14.4.el7.ppc64", "product_id": "python-perf-0:3.10.0-862.14.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-862.14.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.14.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.14.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.14.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.14.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.14.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.14.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-862.14.4.el7.ppc64", "product": { "name": "kernel-0:3.10.0-862.14.4.el7.ppc64", "product_id": "kernel-0:3.10.0-862.14.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.14.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.14.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.14.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.14.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.14.4.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.14.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.14.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-862.14.4.el7.ppc64le", "product": { "name": "perf-0:3.10.0-862.14.4.el7.ppc64le", "product_id": "perf-0:3.10.0-862.14.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-862.14.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.14.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-862.14.4.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-862.14.4.el7.ppc64le", "product_id": "python-perf-0:3.10.0-862.14.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-862.14.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.14.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.14.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.14.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.14.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.14.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-862.14.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-862.14.4.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-862.14.4.el7.ppc64le", "product_id": "kernel-0:3.10.0-862.14.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.14.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.14.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.14.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.14.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.14.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.14.4.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.src", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.14.4.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.14.4.el7.noarch", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.src", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.14.4.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.14.4.el7.noarch", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.src", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.14.4.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.14.4.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.14.4.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.14.4.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.src", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.14.4.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.14.4.el7.noarch", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.src", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.14.4.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.14.4.el7.noarch", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.src", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.14.4.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.14.4.el7.noarch", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.src", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.14.4.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.14.4.el7.noarch", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.src", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.14.4.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.14.4.el7.noarch", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.src", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.14.4.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.14.4.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Qualys Research Labs" ] } ], "cve": "CVE-2018-14634", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2018-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1624498" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in Linux\u0027s create_elf_tables function", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect 32-bit systems as they do not have a large enough address space to exploit this flaw.\n\nSystems with less than 32GB of memory are very unlikely to be affected by this issue due to memory demands during exploitation.\n\nThis issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the version of the kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 will address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14634" }, { "category": "external", "summary": "RHBZ#1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14634", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14634" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy", "url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2018/09/25/4", "url": "https://www.openwall.com/lists/oss-security/2018/09/25/4" } ], "release_date": "2018-09-25T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-09-25T19:22:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2748" }, { "category": "workaround", "details": "To mitigate the issue:\n\nEnable and install kernel-debuginfo packages as per https://access.redhat.com/solutions/666123\n\n1) On the host, save the following in a file with the \".stp\" extension:\n\n// CVE-2018-14634\n//\n// Theory of operations: adjust the thread\u0027s # rlimit-in-effect around\n// calls to the vulnerable get_arg_page() function so as to encompass\n// the newly required _STK_LIM / 4 * 3 maximum.\n\n// Complication: the rlimit is stored in a current-\u003e structure that\n// is shared across the threads of the process. They may concurrently\n// invoke this operation.\n\nfunction clamp_stack_rlim_cur:long ()\n%{\n struct rlimit *rlim = current-\u003esignal-\u003erlim;\n unsigned long rlim_cur = READ_ONCE(rlim[RLIMIT_STACK].rlim_cur);\n\n unsigned long limit = _STK_LIM / 4 * 3;\n limit *= 4; // multiply it back up, to the scale used by rlim_cur\n\n if (rlim_cur \u003e limit) {\n WRITE_ONCE(rlim[RLIMIT_STACK].rlim_cur, limit);\n STAP_RETURN(limit);\n } else\n STAP_RETURN(0);\n%}\n\nprobe kernel.function(\"copy_strings\").call\n{\n l = clamp_stack_rlim_cur()\n if (l)\n printf(\"lowered process %s(%d) STACK rlim_cur to %p\\n\",\n execname(), pid(), l)\n}\n\nprobe begin {\n\tprintf(\"CVE-2018-14634 mitigation loaded\\n\")\n\n}\n\nprobe end {\n\tprintf(\"CVE-2018-14634 mitigation unloaded\\n\")\n}\n\n2) Install the \"systemtap\" package and any required dependencies. Refer\nto the \"2. Using SystemTap\" chapter in the Red Hat Enterprise Linux\n\"SystemTap Beginners Guide\" document, available from docs.redhat.com,\nfor information on installing the required -debuginfo and matching kernel-devel packages\n\n3) Run the \"stap -g [filename-from-step-1].stp\" command as root.\n\nIf the host is rebooted, the changes will be lost and the script must be\nrun again.\n\n\nAlternatively, build the systemtap script on a development system with\n\"stap -g -p 4 [filename-from-step-1].stp\", distribute the resulting\nkernel module to all affected systems, and run \"staprun -L \u003cmodule\u003e\" on those.\nWhen using this approach only systemtap-runtime package is required on\nthe affected systems. Please notice that the kernel version must be the same\nacross all systems.\n\n\nThis may not be a suitable workaround if your application uses massive amounts of stack space. Please consider this if there are any adverse affects when running this mitigation.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.14.4.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.14.4.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.14.4.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.14.4.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Integer overflow in Linux\u0027s create_elf_tables function" } ] }
rhsa-2018:3590
Vulnerability from csaf_redhat
Published
2018-11-13 17:52
Modified
2025-08-02 08:11
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)
* kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c (CVE-2017-18344)
* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)
* kernel: Integer overflow in Linux's create_elf_tables function (CVE-2018-14634)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5391 and Qualys Research Labs for reporting CVE-2018-14634.
Bug Fix(es):
* Previously, a kernel panic occurred when the kernel tried to make an out of bound access to the array that describes the L1 Terminal Fault (L1TF) mitigation state on systems without Extended Page Tables (EPT) support. This update extends the array of mitigation states to cover all the states, which effectively prevents out of bound array access. Also, this update enables rejecting invalid, irrelevant values, that might be erroneously provided by the userspace. As a result, the kernel no longer panics in the described scenario. (BZ#1629565)
* Previously, a packet was missing the User Datagram Protocol (UDP) payload checksum during a full checksum computation, if the hardware checksum was not applied. As a consequence, a packet with an incorrect checksum was dropped by a peer. With this update, the kernel includes the UDP payload checksum during the full checksum computation. As a result, the checksum is computed correctly and the packet can be received by the peer. (BZ#1635792)
* Previously, a transform lookup through the xfrm framework could be performed on an already transformed destination cache entry (dst_entry). When using User Datagram Protocol (UDP) over IPv6 with a connected socket in conjunction with Internet Protocol Security (IPsec) in Encapsulating Security Payload (ESP) transport mode. As a consequence, invalid IPv6 fragments transmitted from the host or the kernel occasionally terminated unexpectedly due to a socket buffer (SKB) underrun. With this update, the xfrm lookup on an already transformed dst_entry is not possible. As a result, using UDP iperf utility over IPv6 ESP no longer causes invalid IPv6 fragment transmissions or a kernel panic. (BZ#1639586)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)\n\n* kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c (CVE-2017-18344)\n\n* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)\n\n* kernel: Integer overflow in Linux\u0027s create_elf_tables function (CVE-2018-14634)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5391 and Qualys Research Labs for reporting CVE-2018-14634.\n\nBug Fix(es):\n\n* Previously, a kernel panic occurred when the kernel tried to make an out of bound access to the array that describes the L1 Terminal Fault (L1TF) mitigation state on systems without Extended Page Tables (EPT) support. This update extends the array of mitigation states to cover all the states, which effectively prevents out of bound array access. Also, this update enables rejecting invalid, irrelevant values, that might be erroneously provided by the userspace. As a result, the kernel no longer panics in the described scenario. (BZ#1629565)\n\n* Previously, a packet was missing the User Datagram Protocol (UDP) payload checksum during a full checksum computation, if the hardware checksum was not applied. As a consequence, a packet with an incorrect checksum was dropped by a peer. With this update, the kernel includes the UDP payload checksum during the full checksum computation. As a result, the checksum is computed correctly and the packet can be received by the peer. (BZ#1635792)\n\n* Previously, a transform lookup through the xfrm framework could be performed on an already transformed destination cache entry (dst_entry). When using User Datagram Protocol (UDP) over IPv6 with a connected socket in conjunction with Internet Protocol Security (IPsec) in Encapsulating Security Payload (ESP) transport mode. As a consequence, invalid IPv6 fragments transmitted from the host or the kernel occasionally terminated unexpectedly due to a socket buffer (SKB) underrun. With this update, the xfrm lookup on an already transformed dst_entry is not possible. As a result, using UDP iperf utility over IPv6 ESP no longer causes invalid IPv6 fragment transmissions or a kernel panic. (BZ#1639586)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:3590", "url": "https://access.redhat.com/errata/RHSA-2018:3590" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy", "url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy" }, { "category": "external", "summary": "1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "external", "summary": "1610958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610958" }, { "category": "external", "summary": "1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3590.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T08:11:03+00:00", "generator": { "date": "2025-08-02T08:11:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:3590", "initial_release_date": "2018-11-13T17:52:19+00:00", "revision_history": [ { "date": "2018-11-13T17:52:19+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-11-13T17:52:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:11:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.2::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.76.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.76.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.76.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.76.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.76.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.76.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.76.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.76.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.76.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.76.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-327.76.1.el7.x86_64", "product": { "name": "kernel-0:3.10.0-327.76.1.el7.x86_64", "product_id": "kernel-0:3.10.0-327.76.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.76.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.76.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.76.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.76.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-327.76.1.el7.x86_64", "product": { "name": "perf-0:3.10.0-327.76.1.el7.x86_64", "product_id": "perf-0:3.10.0-327.76.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-327.76.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-327.76.1.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-327.76.1.el7.x86_64", "product_id": "python-perf-0:3.10.0-327.76.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-327.76.1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-327.76.1.el7.src", "product": { "name": "kernel-0:3.10.0-327.76.1.el7.src", "product_id": "kernel-0:3.10.0-327.76.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.76.1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.76.1.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-327.76.1.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-327.76.1.el7.noarch", "product_id": "kernel-doc-0:3.10.0-327.76.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.76.1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.76.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src" }, "product_reference": "kernel-0:3.10.0-327.76.1.el7.src", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.76.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.76.1.el7.noarch", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.76.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src" }, "product_reference": "kernel-0:3.10.0-327.76.1.el7.src", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.76.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.76.1.el7.noarch", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.76.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src" }, "product_reference": "kernel-0:3.10.0-327.76.1.el7.src", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.76.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.76.1.el7.noarch", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.76.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src" }, "product_reference": "kernel-0:3.10.0-327.76.1.el7.src", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.76.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.76.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.76.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src" }, "product_reference": "kernel-0:3.10.0-327.76.1.el7.src", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.76.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.76.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.76.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src" }, "product_reference": "kernel-0:3.10.0-327.76.1.el7.src", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.76.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.76.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18344", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2018-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1610958" } ], "notes": [ { "category": "description", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "RHBZ#1610958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610958" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-18344", "url": "https://www.cve.org/CVERecord?id=CVE-2017-18344" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18344", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18344" } ], "release_date": "2017-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-13T17:52:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:3590" }, { "category": "workaround", "details": "Attached to this bugzilla is a systemtap script that will prevent opening (and therefore reading) the /proc/\u003cprocess\u003e/timers file which is used to leak information.\n\nThe SystemTap script is relatively small and efficient, broken into 3 distinct sections as follows:\n\n--------\n\nprobe kernel.function(\"proc_timers_open@fs/proc/base.c\").return { \n // this is -EACCES\n\t$return = -13;\n message = sprintf(\"CVE-2017-18344 mitigation denied access to %s to %s(%d)\", file_name , execname(), pid());\n // print a warning message at KERN_INFO debug level\n printk(6, message);\n}\n\nprobe begin {\n printk(6, \"Mitigation for CVE-2017-18344 loaded.\\n\");\n}\n\n\nprobe end {\n printk(6, \"Mitigation for CVE-2017-18344 unloaded.\\n\");\n}\n\n\n---------\n\nFirst, the script places a probe at the return of the kernel function \u201cproc_timers_open\u201d when called. This modifies the return value to be EACCES which would return this value to userspace preventing this file from being opened. When the /proc/\u003cpid\u003e/timer file is attempted to be opened, a message will be logged to the kernel log subsystem showing the process and pid of the application attempting to access the timer file. \n\nThis file is not in widespread use at this time, although some applications may read from it to debug or understand their own timers that are set. This mitigation will not be useful in this context.\n\nFinally, the \u201cprobe begin\u201d and \u201cprobe end\u201d code blocks tell systemtap to add the supplied text to the kernel log buffer via the printk function. This creates an audit trail by registering in the system logs exactly when the mitigation is loaded and unloaded. This will need to be compiled with guru mode (-g parameter) to compile.\n\nThis will need to be loaded at each boot to remain effective. Red Hat Product security recommends updating to a patched kernel when it is available.\n\nRed Hat always seeks to provide both mitigations to disable attacks as well as the actual patches to treat the flaw. To learn more about SystemTap, and how it can be used in your management of your Red Hat systems, please refer to Using SystemTap[1] or one of our videos about it within our Customer Portal[2].\n\n1 - https://access.redhat.com/articles/17839\n2 - https://access.redhat.com/search/#/?q=systemtap", "product_ids": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5391", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1609664" } ], "notes": [ { "category": "description", "text": "A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "RHBZ#1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5391", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5391" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/641765", "url": "https://www.kb.cert.org/vuls/id/641765" } ], "release_date": "2018-08-14T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-13T17:52:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:3590" }, { "category": "workaround", "details": "One may change the default 4MB and 3MB values of net.ipv4.ipfrag_high_thresh and net.ipv4.ipfrag_low_thresh (and their ipv6 counterparts net.ipv6.ipfrag_high_thresh and net.ipv6.ipfrag_low_thresh) to 256 kB and 192 kB (respectively) or below. Tests show some to significant CPU saturation drop during an attack, depending on a hardware, configuration and environment.\n\nThere can be some impact on performance though, due to ipfrag_high_thresh of 262144 bytes, as only two 64K fragments can fit in the reassembly queue at the same time. For example, there is a risk of breaking applications that rely on large UDP packets.\n\nSee the Mitigation section in the https://access.redhat.com/articles/3553061 article for the script to quickly change to/from default and lower settings.", "product_ids": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)" }, { "cve": "CVE-2018-10675", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1575065" } ], "notes": [ { "category": "description", "text": "The do_get_mempolicy() function in mm/mempolicy.c in the Linux kernel allows local users to hit a use-after-free bug via crafted system calls and thus cause a denial of service (DoS) or possibly have unspecified other impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10675" }, { "category": "external", "summary": "RHBZ#1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10675", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675" } ], "release_date": "2017-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-13T17:52:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:3590" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact" }, { "acknowledgments": [ { "names": [ "Qualys Research Labs" ] } ], "cve": "CVE-2018-14634", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2018-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1624498" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in Linux\u0027s create_elf_tables function", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect 32-bit systems as they do not have a large enough address space to exploit this flaw.\n\nSystems with less than 32GB of memory are very unlikely to be affected by this issue due to memory demands during exploitation.\n\nThis issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the version of the kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 will address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14634" }, { "category": "external", "summary": "RHBZ#1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14634", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14634" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy", "url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2018/09/25/4", "url": "https://www.openwall.com/lists/oss-security/2018/09/25/4" } ], "release_date": "2018-09-25T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-13T17:52:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:3590" }, { "category": "workaround", "details": "To mitigate the issue:\n\nEnable and install kernel-debuginfo packages as per https://access.redhat.com/solutions/666123\n\n1) On the host, save the following in a file with the \".stp\" extension:\n\n// CVE-2018-14634\n//\n// Theory of operations: adjust the thread\u0027s # rlimit-in-effect around\n// calls to the vulnerable get_arg_page() function so as to encompass\n// the newly required _STK_LIM / 4 * 3 maximum.\n\n// Complication: the rlimit is stored in a current-\u003e structure that\n// is shared across the threads of the process. They may concurrently\n// invoke this operation.\n\nfunction clamp_stack_rlim_cur:long ()\n%{\n struct rlimit *rlim = current-\u003esignal-\u003erlim;\n unsigned long rlim_cur = READ_ONCE(rlim[RLIMIT_STACK].rlim_cur);\n\n unsigned long limit = _STK_LIM / 4 * 3;\n limit *= 4; // multiply it back up, to the scale used by rlim_cur\n\n if (rlim_cur \u003e limit) {\n WRITE_ONCE(rlim[RLIMIT_STACK].rlim_cur, limit);\n STAP_RETURN(limit);\n } else\n STAP_RETURN(0);\n%}\n\nprobe kernel.function(\"copy_strings\").call\n{\n l = clamp_stack_rlim_cur()\n if (l)\n printf(\"lowered process %s(%d) STACK rlim_cur to %p\\n\",\n execname(), pid(), l)\n}\n\nprobe begin {\n\tprintf(\"CVE-2018-14634 mitigation loaded\\n\")\n\n}\n\nprobe end {\n\tprintf(\"CVE-2018-14634 mitigation unloaded\\n\")\n}\n\n2) Install the \"systemtap\" package and any required dependencies. Refer\nto the \"2. Using SystemTap\" chapter in the Red Hat Enterprise Linux\n\"SystemTap Beginners Guide\" document, available from docs.redhat.com,\nfor information on installing the required -debuginfo and matching kernel-devel packages\n\n3) Run the \"stap -g [filename-from-step-1].stp\" command as root.\n\nIf the host is rebooted, the changes will be lost and the script must be\nrun again.\n\n\nAlternatively, build the systemtap script on a development system with\n\"stap -g -p 4 [filename-from-step-1].stp\", distribute the resulting\nkernel module to all affected systems, and run \"staprun -L \u003cmodule\u003e\" on those.\nWhen using this approach only systemtap-runtime package is required on\nthe affected systems. Please notice that the kernel version must be the same\nacross all systems.\n\n\nThis may not be a suitable workaround if your application uses massive amounts of stack space. Please consider this if there are any adverse affects when running this mitigation.", "product_ids": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.76.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.76.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.76.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Integer overflow in Linux\u0027s create_elf_tables function" } ] }
ghsa-4994-8w6g-9jvw
Vulnerability from github
Published
2022-05-13 01:08
Modified
2022-05-13 01:08
Severity ?
VLAI Severity ?
Details
An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.
{ "affected": [], "aliases": [ "CVE-2018-14634" ], "database_specific": { "cwe_ids": [ "CWE-190" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-09-25T21:29:00Z", "severity": "HIGH" }, "details": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.", "id": "GHSA-4994-8w6g-9jvw", "modified": "2022-05-13T01:08:25Z", "published": "2022-05-13T01:08:25Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634" }, { "type": "WEB", "url": "https://www.openwall.com/lists/oss-security/2018/09/25/4" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/45516" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3779-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3775-2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3775-1" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K20934447?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K20934447?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "type": "WEB", "url": "https://security.paloaltonetworks.com/CVE-2018-14634" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20190204-0002" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14634" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "type": "WEB", "url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2018-14634" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:3643" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:3591" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:3590" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:3586" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:3540" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2933" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2925" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2924" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2846" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2763" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2748" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2021/07/20/2" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/105407" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
gsd-2018-14634
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2018-14634", "description": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.", "id": "GSD-2018-14634", "references": [ "https://www.suse.com/security/cve/CVE-2018-14634.html", "https://access.redhat.com/errata/RHSA-2018:3643", "https://access.redhat.com/errata/RHSA-2018:3591", "https://access.redhat.com/errata/RHSA-2018:3590", "https://access.redhat.com/errata/RHSA-2018:3586", "https://access.redhat.com/errata/RHSA-2018:3540", "https://access.redhat.com/errata/RHSA-2018:2933", "https://access.redhat.com/errata/RHSA-2018:2925", "https://access.redhat.com/errata/RHSA-2018:2924", "https://access.redhat.com/errata/RHSA-2018:2846", "https://access.redhat.com/errata/RHSA-2018:2763", "https://access.redhat.com/errata/RHSA-2018:2748", "https://ubuntu.com/security/CVE-2018-14634", "https://alas.aws.amazon.com/cve/html/CVE-2018-14634.html", "https://linux.oracle.com/cve/CVE-2018-14634.html", "https://packetstormsecurity.com/files/cve/CVE-2018-14634" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-14634" ], "details": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.", "id": "GSD-2018-14634", "modified": "2023-12-13T01:22:38.079643Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-14634", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "kernel", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.6.x, 3.10.x, 4.14.x" } ] } } ] }, "vendor_name": "The Linux Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable." } ] }, "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-190", "lang": "eng", "value": "CWE-190" } ] } ] }, "references": { "reference_data": [ { "name": "https://usn.ubuntu.com/3775-1/", "refsource": "MISC", "url": "https://usn.ubuntu.com/3775-1/" }, { "name": "https://usn.ubuntu.com/3775-2/", "refsource": "MISC", "url": "https://usn.ubuntu.com/3775-2/" }, { "name": "https://usn.ubuntu.com/3779-1/", "refsource": "MISC", "url": "https://usn.ubuntu.com/3779-1/" }, { "name": "http://www.openwall.com/lists/oss-security/2021/07/20/2", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2021/07/20/2" }, { "name": "http://www.securityfocus.com/bid/105407", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/105407" }, { "name": "https://access.redhat.com/errata/RHSA-2018:2748", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2018:2748" }, { "name": "https://access.redhat.com/errata/RHSA-2018:2763", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2018:2763" }, { "name": "https://access.redhat.com/errata/RHSA-2018:2846", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2018:2846" }, { "name": "https://access.redhat.com/errata/RHSA-2018:2924", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2018:2924" }, { "name": "https://access.redhat.com/errata/RHSA-2018:2925", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2018:2925" }, { "name": "https://access.redhat.com/errata/RHSA-2018:2933", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2018:2933" }, { "name": "https://access.redhat.com/errata/RHSA-2018:3540", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2018:3540" }, { "name": "https://access.redhat.com/errata/RHSA-2018:3586", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2018:3586" }, { "name": "https://access.redhat.com/errata/RHSA-2018:3590", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2018:3590" }, { "name": "https://access.redhat.com/errata/RHSA-2018:3591", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2018:3591" }, { "name": "https://access.redhat.com/errata/RHSA-2018:3643", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2018:3643" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14634", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14634" }, { "name": "https://security.netapp.com/advisory/ntap-20190204-0002/", "refsource": "MISC", "url": "https://security.netapp.com/advisory/ntap-20190204-0002/" }, { "name": "https://security.paloaltonetworks.com/CVE-2018-14634", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2018-14634" }, { "name": "https://support.f5.com/csp/article/K20934447?utm_source=f5support\u0026amp%3Butm_medium=RSS", "refsource": "MISC", "url": "https://support.f5.com/csp/article/K20934447?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "name": "https://www.exploit-db.com/exploits/45516/", "refsource": "MISC", "url": "https://www.exploit-db.com/exploits/45516/" }, { "name": "https://www.openwall.com/lists/oss-security/2018/09/25/4", "refsource": "MISC", "url": "https://www.openwall.com/lists/oss-security/2018/09/25/4" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.10.102", "versionStartIncluding": "3.10.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.6.39.4", "versionStartIncluding": "2.6.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.14.54", "versionStartIncluding": "4.14.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-14634" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-190" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20180925 Integer overflow in Linux\u0027s create_elf_tables() (CVE-2018-14634)", "refsource": "MLIST", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2018/09/25/4" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14634", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14634" }, { "name": "RHSA-2018:2763", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2763" }, { "name": "RHSA-2018:2748", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2748" }, { "name": "105407", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105407" }, { "name": "45516", "refsource": "EXPLOIT-DB", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/45516/" }, { "name": "USN-3775-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3775-2/" }, { "name": "USN-3779-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3779-1/" }, { "name": "USN-3775-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3775-1/" }, { "name": "RHSA-2018:2846", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2846" }, { "name": "RHSA-2018:2933", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2933" }, { "name": "RHSA-2018:2925", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2925" }, { "name": "RHSA-2018:2924", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2924" }, { "name": "RHSA-2018:3591", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3591" }, { "name": "RHSA-2018:3590", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3590" }, { "name": "RHSA-2018:3586", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3586" }, { "name": "RHSA-2018:3540", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3540" }, { "name": "RHSA-2018:3643", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3643" }, { "name": "https://security.netapp.com/advisory/ntap-20190204-0002/", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190204-0002/" }, { "name": "https://security.paloaltonetworks.com/CVE-2018-14634", "refsource": "CONFIRM", "tags": [], "url": "https://security.paloaltonetworks.com/CVE-2018-14634" }, { "name": "[oss-security] 20210720 CVE-2021-33910: Denial of service (stack exhaustion) in systemd (PID 1)", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2021/07/20/2" }, { "name": "https://support.f5.com/csp/article/K20934447?utm_source=f5support\u0026amp%3Butm_medium=RSS", "refsource": "MISC", "tags": [], "url": "https://support.f5.com/csp/article/K20934447?utm_source=f5support\u0026amp%3Butm_medium=RSS" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2023-02-13T04:51Z", "publishedDate": "2018-09-25T21:29Z" } } }
fkie_cve-2018-14634
Vulnerability from fkie_nvd
Published
2018-09-25 21:29
Modified
2024-11-21 03:49
Severity ?
7.8 (High) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2021/07/20/2 | ||
secalert@redhat.com | http://www.securityfocus.com/bid/105407 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:2748 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:2763 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:2846 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:2924 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:2925 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:2933 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:3540 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:3586 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:3590 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:3591 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:3643 | Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14634 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://security.netapp.com/advisory/ntap-20190204-0002/ | Patch, Third Party Advisory | |
secalert@redhat.com | https://security.paloaltonetworks.com/CVE-2018-14634 | ||
secalert@redhat.com | https://support.f5.com/csp/article/K20934447?utm_source=f5support&%3Butm_medium=RSS | ||
secalert@redhat.com | https://usn.ubuntu.com/3775-1/ | Third Party Advisory | |
secalert@redhat.com | https://usn.ubuntu.com/3775-2/ | Third Party Advisory | |
secalert@redhat.com | https://usn.ubuntu.com/3779-1/ | Third Party Advisory | |
secalert@redhat.com | https://www.exploit-db.com/exploits/45516/ | Exploit, Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://www.openwall.com/lists/oss-security/2018/09/25/4 | Exploit, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2021/07/20/2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/105407 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2748 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2763 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2846 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2924 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2925 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2933 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3540 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3586 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3590 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3591 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3643 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14634 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20190204-0002/ | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.paloaltonetworks.com/CVE-2018-14634 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K20934447?utm_source=f5support&%3Butm_medium=RSS | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3775-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3775-2/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3779-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/45516/ | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.openwall.com/lists/oss-security/2018/09/25/4 | Exploit, Mailing List, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
redhat | enterprise_linux_desktop | 6.0 | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 6.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_server_aus | 6.5 | |
redhat | enterprise_linux_server_aus | 6.6 | |
redhat | enterprise_linux_server_aus | 7.6 | |
redhat | enterprise_linux_server_eus | 6.7 | |
redhat | enterprise_linux_server_eus | 7.5 | |
redhat | enterprise_linux_server_eus | 7.6 | |
redhat | enterprise_linux_server_tus | 6.6 | |
redhat | enterprise_linux_server_tus | 7.6 | |
redhat | enterprise_linux_workstation | 6.0 | |
redhat | enterprise_linux_workstation | 7.0 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
netapp | active_iq_performance_analytics_services | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "C737E90F-5DD9-493E-9318-6A97012B6103", "versionEndIncluding": "2.6.39.4", "versionStartIncluding": "2.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "2452BC55-3EAF-4F7B-B55B-563E94E2333E", "versionEndIncluding": "3.10.102", "versionStartIncluding": "3.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "4AE02892-57B2-4595-A57F-2C8B4C6F3D0C", "versionEndIncluding": "4.14.54", "versionStartIncluding": "4.14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "16E6D998-B41D-4B49-9E00-8336D2E40A4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*", "matchCriteriaId": "6C81647C-9A53-481D-A54C-36770A093F90", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "BF77CDCF-B9C9-427D-B2BF-36650FB2148C", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "13E02156-E748-4820-B76F-7074793837E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*", "matchCriteriaId": "83077160-BB98-408B-81F0-8EF9E566BF28", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable." }, { "lang": "es", "value": "Se ha encontrado un error de desbordamiento de enteros en la funci\u00f3n create_elf_tables() del kernel de Linux. Un usuario local sin privilegios con acceso al binario SUID (o a otro privilegiado) podr\u00eda emplear este error para escalar sus privilegios en el sistema. Se cree que las versiones 2.6.x, 3.10.x y 4.14.x del kernel se han visto afectadas." } ], "id": "CVE-2018-14634", "lastModified": "2024-11-21T03:49:28.560", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-25T21:29:00.390", "references": [ { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2021/07/20/2" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105407" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2748" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2763" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2846" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2924" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2925" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2933" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3540" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3586" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3590" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3591" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3643" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14634" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190204-0002/" }, { "source": "secalert@redhat.com", "url": "https://security.paloaltonetworks.com/CVE-2018-14634" }, { "source": "secalert@redhat.com", "url": "https://support.f5.com/csp/article/K20934447?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3775-1/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3775-2/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3779-1/" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/45516/" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2018/09/25/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2021/07/20/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2748" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2763" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2846" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2924" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2925" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2933" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3540" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3586" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3590" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3591" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3643" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190204-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.paloaltonetworks.com/CVE-2018-14634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.f5.com/csp/article/K20934447?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3775-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3775-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3779-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/45516/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2018/09/25/4" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "secalert@redhat.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…